Flame

Cisco, Fortinet issue fixes against Equation Group exploitsCisco, Fortinet issue fixes against Equation Group exploits

Cisco, Fortinet issue fixes against Equation Group exploits

Customers of Cisco and Fortinet security firms need to patch their products to fix the flaws exploited by the Equation…

9 years ago

A close look at the exploits leaked after the Equation Group hack

The NSA-linked unit The Equation Group has been hacked and a data dump containing exploits and tools has been leaked…

9 years ago
Snowden: NSA Equation Group hack may be the Kremlin’s warningSnowden: NSA Equation Group hack may be the Kremlin’s warning

Snowden: NSA Equation Group hack may be the Kremlin’s warning

According to the popular whistleblower Edward Snowden the hack of the NSA Equation Group may be a Russian response to…

9 years ago
The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.

The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.

A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in…

9 years ago
Information Warfare – Iran vs America. Why buy a weapon when I have a keyboard?Information Warfare – Iran vs America. Why buy a weapon when I have a keyboard?

Information Warfare – Iran vs America. Why buy a weapon when I have a keyboard?

A newly disclosed secret report illustrates the tightening of cyber dispute between the United States and Iran , both for…

10 years ago
CyberCriminals and their APT and AVT TechniquesCyberCriminals and their APT and AVT Techniques

CyberCriminals and their APT and AVT Techniques

The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat)…

10 years ago
The Equation Group shows most complex and sophisticated hacking techniques ever seenThe Equation Group shows most complex and sophisticated hacking techniques ever seen

The Equation Group shows most complex and sophisticated hacking techniques ever seen

Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of…

10 years ago
Is it possible to attribute the backdoor Regin to the cybercrime?Is it possible to attribute the backdoor Regin to the cybercrime?

Is it possible to attribute the backdoor Regin to the cybercrime?

The popular cyber security expert Raoul Chiesa commented the hypothesis that backdoor Regin is a product of organized cybercrime. Excerpt…

11 years ago
Regin – Highly advanced spying tool discovered by SymantecRegin – Highly advanced spying tool discovered by Symantec

Regin – Highly advanced spying tool discovered by Symantec

Symantec has uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure…

11 years ago
Analysis of the Stuxnet Cyber Weapon Family and DragonflyAnalysis of the Stuxnet Cyber Weapon Family and Dragonfly

Analysis of the Stuxnet Cyber Weapon Family and Dragonfly

Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of…

11 years ago