Hackers from the group TeamBerserk announced to have leaked numerous sensitive documents from systems of some DHS Intelligence Fusion Centers. The Group of hackers known as TeamBerserk claim to have stolen 54mb of compressed documents from the systems of some US Department of Homeland Security (DHS) Intelligence Fusion Centers. The group announced it with a Tweet: […]
The energy industry continues to be a privileged target for cyber attacks of hacktivists, state-sponsored hackers and cybercriminals. The alarm from UAE Oil and gas companies are considerable privileged targets of cyber attacks, cybercriminals, state-sponsored hackers and hacktivists daily menace security of infrastructure in the energy industry. The number of attacks worldwide against Oil and […]
New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American officials and private security experts. A new series of cyber attacks from Iran hit US enterprises, the offensive has been revealed by American officials and private security experts. The attacks are classified as âpotentially destructiveâ and targeted IT […]
Cyber espionage is considerable as  one of the most aggressive and dangerous cyber threats, its silent operation could steal sensitive information, company secrets and intellectual properties for a long time. Recently many cyber espionage campaigns have been discovered, last in order of time is the Winnti campaign but we cannot forted also Red October and […]
Rapid7 security firm has published an interesting whitepaper entitled âSecurity Flaws in Universal Plug and Playâ in which reports the result of a research conducted in the second half of 2012 that evaluated the global exposure of UPnP-enabled network devices. Security world has become accustomed to so surprising data, over 80 million unique IPs were identified […]
Governments all around the world are committed for the definition of a proper cyber strategy that represents an optimum balance between a good cyber offense and an efficient cyber defense. Cyber conflicts are characterized by the necessity of an immediate cyber response to the incoming cyber threats, in many cases the reaction must be […]
In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal concerns are related to all those objects with an “intelligent component” that we daily use and that we expose on internet for different purposes. This category includes also the Medical devices, elements with increasing complexity […]
The “National Preparedness Report” is the first assessment, directly commissioned by President Obama, on the US capabilities of response to a terrorist attacks and man-made and natural disasters. Really interesting is the component related to cyber security, U.S. Computer Emergency Readiness Team (US-CERT) has reported an impressive growth of the number of cyber attacks and […]