Pierluigi Paganini August 18, 2016
Cisco, Fortinet issue fixes against Equation Group exploits

Customers of Cisco and Fortinet security firms need to patch their products to fix the flaws exploited by the Equation Group exploits and hacking tools. While security experts are analyzing the hacking tools leaked in the data dump by the Shadow Brokers, security firms are working to fix the vulnerabilities exploited by the Equation Group toolsets. Both […]

Pierluigi Paganini August 18, 2016
A close look at the exploits leaked after the Equation Group hack

The NSA-linked unit The Equation Group has been hacked and a data dump containing exploits and tools has been leaked online. Is it legitimate? It is the topic of the moment, the group The Shadow Brokers has hacked the NSA-linked unit the Equation Group and leaked online exploits and hacking tools. The hackers had dumped online […]

Pierluigi Paganini August 17, 2016
Snowden: NSA Equation Group hack may be the Kremlin’s warning

According to the popular whistleblower Edward Snowden the hack of the NSA Equation Group may be a Russian response to the US. The public auction of stolen NSA exploits and hacking tools may be the response of the Russian Government to the US Government that is blaming it for the DNC hack. This is also […]

Pierluigi Paganini August 16, 2016
The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.

A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in online auction. Security experts discussed several times about potential effects of the militarization of the cyberspace. Government-built malware and cyber weapons may run out of control, cyber weapons and hacking tools developed by nation-state hackers […]

Pierluigi Paganini March 10, 2015
Information Warfare – Iran vs America. Why buy a weapon when I have a keyboard?

A newly disclosed secret report illustrates the tightening of cyber dispute between the United States and Iran , both for spying and sabotage. Since Robert Tappan Morris in 1988 created the first worm, cyberspace started to change its virtual state in a critical cyberwar field.  Even if the first worm was an error, aimed at […]

Pierluigi Paganini February 23, 2015
CyberCriminals and their APT and AVT Techniques

The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat) . Cybercriminals and their techniques in the APT and AVT attacks “APT is an attack in the persistent memory that resides in the victims machine without getting noticed and the attacker exfiltrates sensitive information from […]

Pierluigi Paganini February 17, 2015
The Equation Group shows most complex and sophisticated hacking techniques ever seen

Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with  sophisticated zero-day malware. According to a new report from Kaspersky Lab, this group, dubbed […]

Pierluigi Paganini December 01, 2014
Is it possible to attribute the backdoor Regin to the cybercrime?

The popular cyber security expert Raoul Chiesa commented the hypothesis that backdoor Regin is a product of organized cybercrime. Excerpt from a detailed analysis published on the Infosec Institute In this phase it is quite impossible to attribute precisely the development of the Regin malware to a specific category of threat actors. Until now we […]

Pierluigi Paganini November 24, 2014
Regin – Highly advanced spying tool discovered by Symantec

Symantec has uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure operators. Backdoor Regin, is the name assigned by the experts at Symantec to an advanced spying tool that has been used in cyber espionage campaigns against governments, infrastructure operators, private companies, researchers, and private individuals. Regin appears […]

Pierluigi Paganini August 04, 2014
Analysis of the Stuxnet Cyber Weapon Family and Dragonfly

Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of national security to develop advanced mitigation techniques and capabilities. The progenitor of Duqu, Flame and Gauss are reported as the authors of STUXNET. As illustrated, the trend of advancements between these four cyber weapons suggests […]