DDoS

The rise of exploit kits according to Solutionary SERT

Today I desire to discuss about a very interesting study by Solutionary's Security Engineering Research Team (SERT) that shared the…

12 years ago

Cyber warfare between Koreas, a warning for any cyber power

Earlier this month is has been spread the news that South Korea is investing to improve the cyber capabilities of…

12 years ago

Red October, RBN and too many questions still unresolved

The recently discovered cyber espionage campaign “Red October” has shocked world wide security community, the principal questions raised are: Who…

12 years ago

Hacktivism and web monitoring in 2013 for Security Affairs

The year is ending and it’s very easy to read forecast for next year, experts are sure that we will…

12 years ago

TheAndroid.DDoS.1.origin, a new malware detected on Android mobile

In line with expectations a new cyber threat is menacing the mobile, in particular the most diffused OS, Android. The…

12 years ago

New attacks against banking, cyber Jihad or cyber warfare acts?

Last week the hacker group known as "Izz ad-Din al-Qassam Cyber Fighters" announced a series of attacks against principal banking…

12 years ago

Group-IB: Banking trojan «Carberp» sales were reborn with bootkit module

During the last week introduced you the excellent work done by the Group-IB, a security firm resident of the Moscow-based Skolkovo…

12 years ago

How to get into your house through SmartTV

It's time of analysis for the past year and forecasts on what will be the main cyber threats for next…

12 years ago

Skynet, the potential use of Tor as a bulletproof botnet

On September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet…

12 years ago

#OpIsrael, all about offensive of Anonymous against Israel

Hacktivism attacks will not change Israeli policy but for sure their operations could represent a dangerous cyber threat for any…

12 years ago

This website uses cookies.