Flame

Israel vs Iran.The strategic importance of 5° domain,the cyberspaceIsrael vs Iran.The strategic importance of 5° domain,the cyberspace

Israel vs Iran.The strategic importance of 5° domain,the cyberspace

Time passes and the dispute between Iran and Israel is becoming increasingly more complex to manage. Apparently everything seems crystallized waiting for…

13 years ago
Cyber security landscape in AfricaCyber security landscape in Africa

Cyber security landscape in Africa

Let me present you a very interesting study on cyber security landscape in Africa, conducted by IDG Connect, division of International…

13 years ago
Tens of zero day vulnerabilities, millions of users exposedTens of zero day vulnerabilities, millions of users exposed

Tens of zero day vulnerabilities, millions of users exposed

Every day we read about cyber threats, zero day vulnerabilities and new patch to apply so I decided to speak…

13 years ago
Flame, miniFlame, the mystery of an on going cyber espionage campaignFlame, miniFlame, the mystery of an on going cyber espionage campaign

Flame, miniFlame, the mystery of an on going cyber espionage campaign

Last May The Iranian Computer Emergency Response Team (MAHER) detected a new targeted malware which hit the country, that has been…

13 years ago
Iran,increasing tension with Western countries under cyber perspectiveIran,increasing tension with Western countries under cyber perspective

Iran,increasing tension with Western countries under cyber perspective

The tensions between Iran and Western countries are always in the principal news, the fear for an imminent Israel attack…

13 years ago
Analisys on Flame C&C, the cyber war began long agoAnalisys on Flame C&C, the cyber war began long ago

Analisys on Flame C&C, the cyber war began long ago

In May Iranian Computer Emergency Response Team Coordination CenterLab,  CrySyS Lab and Kaspersky Lab have published a news regarding a…

13 years ago
State-sponsored attack or not, that’s the questionState-sponsored attack or not, that’s the question

State-sponsored attack or not, that’s the question

The defense of cyberspace is becoming one the most concerning question to approach, governments all around the world are massively…

13 years ago
Elderwood project, who is behind Op. Aurora and ongoing attacks?Elderwood project, who is behind Op. Aurora and ongoing attacks?

Elderwood project, who is behind Op. Aurora and ongoing attacks?

Today I desire to discuss on the real effect of a cyber attack, we have recently introduced the direct and…

13 years ago
Dangerous waves of malware are transforming cyberspace in a jungleDangerous waves of malware are transforming cyberspace in a jungle

Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber…

13 years ago
Wiper, assumptions and difficulties analyzing a malwareWiper, assumptions and difficulties analyzing a malware

Wiper, assumptions and difficulties analyzing a malware

During last April many press agencies and security firms published a story related to the detection of a new malware,…

13 years ago