Espionage

Russian cyber experts were charged with treason due to the allegations made seven years agoRussian cyber experts were charged with treason due to the allegations made seven years ago

Russian cyber experts were charged with treason due to the allegations made seven years ago

In December 2016 two Russian state security officers and a cyber security expert in Moscow were charged with treason due…

8 years ago
Operation Kingphish: Cyber Attacks against human rights activists in Qatar and NepalOperation Kingphish: Cyber Attacks against human rights activists in Qatar and Nepal

Operation Kingphish: Cyber Attacks against human rights activists in Qatar and Nepal

Amnesty International has recently uncovered a spear phishing campaign dubbed Operation Kingphish that targeted groups in Qatar and Nepal. Human…

8 years ago
ENISA Threat Landscape Report 2016, who is attacking us, and how?ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA has issued the annual ENISA Threat Landscape Report 2016, a document that synthesizes the emerging trends in cyber security…

8 years ago
Weaponizing of the insider in the Dark Web, a dangerous phenomenonWeaponizing of the insider in the Dark Web, a dangerous phenomenon

Weaponizing of the insider in the Dark Web, a dangerous phenomenon

A study revealed how hackers in the dark web are arming insiders with the tools and knowledge necessary to help…

8 years ago
President Obama commutes Chelsea Manning sentencePresident Obama commutes Chelsea Manning sentence

President Obama commutes Chelsea Manning sentence

President Barack Obama has commuted Chelsea Manning's sentence for leaking confidential documents to Wikileaks in 2010. He will be released…

8 years ago
Infected firmware spotted in well-known low-cost Android devicesInfected firmware spotted in well-known low-cost Android devices

Infected firmware spotted in well-known low-cost Android devices

Experts from Doctor Web spotted new Trojans into the firmware of several dozens of low-cost Android smartphones and tablets. Again…

9 years ago
A second backdoor in a week discovered in firmware of Chinese low-cost Android devicesA second backdoor in a week discovered in firmware of Chinese low-cost Android devices

A second backdoor in a week discovered in firmware of Chinese low-cost Android devices

For the second time in a few days, security experts spotted a backdoor in the firmware of low-cost Android devices. Last…

9 years ago
Experts spotted a secret backdoor in Android phones that sends data to ChinaExperts spotted a secret backdoor in Android phones that sends data to China

Experts spotted a secret backdoor in Android phones that sends data to China

Experts at Kryptowire discovered a mobile phone firmware that transmitted personally identifiable information without user consent due to a backdoor.…

9 years ago
Ukrainian hackers Cyber Hunta leaked emails of Putin’s AdvisorUkrainian hackers Cyber Hunta leaked emails of Putin’s Advisor

Ukrainian hackers Cyber Hunta leaked emails of Putin’s Advisor

Hackers of the Cyber Hunta collective leaked thousands of emails allegedly stolen from the account of Vladislav Yuryevich Surkov. Last…

9 years ago
Reading the ‘High Crime Trends 2016’ Report from Group-IBReading the ‘High Crime Trends 2016’ Report from Group-IB

Reading the ‘High Crime Trends 2016’ Report from Group-IB

The Group-IB firm has published a report titled "High Crime Trends 2016" that includes interesting data about principal cybercrime trends.…

9 years ago