Customers of Cisco and Fortinet security firms need to patch their products to fix the flaws exploited by the Equation Group exploits and hacking tools. While security experts are analyzing the hacking tools leaked in the data dump by the Shadow Brokers, security firms are working to fix the vulnerabilities exploited by the Equation Group toolsets. Both […]
The NSA-linked unit The Equation Group has been hacked and a data dump containing exploits and tools has been leaked online. Is it legitimate? It is the topic of the moment, the group The Shadow Brokers has hacked the NSA-linked unit the Equation Group and leaked online exploits and hacking tools. The hackers had dumped online […]
According to the popular whistleblower Edward Snowden the hack of the NSA Equation Group may be a Russian response to the US. The public auction of stolen NSA exploits and hacking tools may be the response of the Russian Government to the US Government that is blaming it for the DNC hack. This is also […]
A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in online auction. Security experts discussed several times about potential effects of the militarization of the cyberspace. Government-built malware and cyber weapons may run out of control, cyber weapons and hacking tools developed by nation-state hackers […]
A newly disclosed secret report illustrates the tightening of cyber dispute between the United States and Iran , both for spying and sabotage. Since Robert Tappan Morris in 1988 created the first worm, cyberspace started to change its virtual state in a critical cyberwar field. Even if the first worm was an error, aimed at […]
The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat) . Cybercriminals and their techniques in the APT and AVT attacks âAPT is an attack in the persistent memory that resides in the victims machine without getting noticed and the attacker exfiltrates sensitive information from […]
Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with sophisticated zero-day malware. According to a new report from Kaspersky Lab, this group, dubbed […]
The popular cyber security expert Raoul Chiesa commented the hypothesis that backdoor Regin is a product of organized cybercrime. Excerpt from a detailed analysis published on the Infosec Institute In this phase it is quite impossible to attribute precisely the development of the Regin malware to a specific category of threat actors. Until now we […]
Symantec has uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure operators. Backdoor Regin, is the name assigned by the experts at Symantec to an advanced spying tool that has been used in cyber espionage campaigns against governments, infrastructure operators, private companies, researchers, and private individuals. Regin appears […]
Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of national security to develop advanced mitigation techniques and capabilities. The progenitor of Duqu, Flame and Gauss are reported as the authors of STUXNET. As illustrated, the trend of advancements between these four cyber weapons suggests […]