Symantec revealed the existence of 49 new modules of the Regin espionage platform, a circumstance that suggests that its operators are still active. In November 2014, security experts at Symantec have uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure operators. The Regin malware has been around […]
FireEye discovered two distinct groups of Chinese hackers operating cyber espionage campaigns on a large-scale in parallel. Security experts at FireEye have discovered two hacking campaigns conducted by distinct groups operating in separate regions of China that seems to work in parallel. The first team of hackers, named Moafee, is targeting military and government organizations which were in some […]
Al Jazeera obtained the emails exchanged between Google executives and former NSA director Alexander which suggest that Google is very close to NSA. The IT Giants Apple, Google and Microsoft always denied any involvement in the surveillance program despite Edward Snowden as produced different documents attesting to the inconvenient truth. Now a new event is shocking the […]
Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before! The fact that Chinese hackers are most persistent collectors for sensitive information is not a mystery, more difficult to demonstrate the direct involvement of the PLA behind the operations of computer experts that systematically seek to unravel […]
Security vendor FireEye has published a detailed analysis on the popular Poison Ivy RAT, releasing also a set of tools to analyze infections. Security firm FireEye published an interesting analysis on the popular malware Poison Ivy, a remote access trojan (RAT) used in RSA SecurID attack. Poison IVY was also used in the 2011 Nitro […]
Chinese Hacking Team Comment Crew caught taking over a honeypot simulating a Water Plant, the infinite offensive of Chinese Cyber Units linked to PLA. The Comment Crew group of hackers has been identified during an attack to a fake US control system of a water facility. The researchers deployed a honeypot to collect evidences on the attackers that […]
Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities that could allow an attacker to remotely access to the computers. Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities. Lenovo PC banned by spy agencies in the UK, Australia and the US due the possible impairment […]
Two security researchers announced that they have succeeded to transform Verizon mobile phones into spy tools to track Verizonâs users. The security experts revealed to the Reuters agency that it is possible to hack Verizon mobile phones for surveillance purpose, the researchers will present the discovery during the next hacking conferences this summer, the DEF […]
The number of attacks against gaming platforms is constantly increasing, the recent data breach occurred to Nintendo and Ubisoft are just the tip of the iceberg. Gaming platforms are considerable privileged targets for cybercriminals but also for state-sponsored hackers. The first group of attackers is mainly attracted by possibility to steal sensitive information, in many […]
Chinese hackers Comment Crew is changing tactics, security firms suspected it due the analysis of principal cyber espionage campaigns targeted their clients. The Comment Crew is back again, security experts suspect the involvement of the Chinese group of hackers in the cyber dispute between U.S. and China.  In February The Mandiant Intelligence Center⢠released an interesting report […]