The New York Times reported that a group of hackers is interfering with the activities made through social media by members of the ISIS group. According to The New York Times hackers are targeting accounts used by ISIS members for propaganda and recruit new sympathizers. A group of hackers using the pseudonyms of TouchMyTweets, The Doctor and IS Hunting are targeting suspected ISIS […]
Security experts at Trend micro uncovered a new hacking campaign dubbed Operation Woolen Goldfish likely run by a threat actor group known as Rocket Kitten. Security experts at Trend Micro have uncovered a new cyber espionage campaign that is targeting a number of European organisations and businesses. The attackers run a spear phishing campaign that […]
Hacker who posted online information on Nuclear Plants in South Korea demands money for not selling other sensitive information to other governments. The Government of Seoul has issued a report blaming North Korea for cyber attacks against computers at Korea Hydro and Nuclear Power (KHNP), a subsidiary of the Korea Electric Power Corporation (KEPCO) that […]
Federal officials announced that military received the green light to hire 3,000 cyber experts to assign to the US Cyber Command. Information warfare is strategic for almost every government, North Korea, Russia, China, Danmark are among the countries that are more investing to improve their cyber capabilities, and of course, the Five Eyes. The US Department of […]
British NCA has arrested a 23-year-old man suspected to be a member of the hacking crew that run the attack on the US Department of Defense in the 2014. British law enforcement has identified and arrested a 23-year-old man over a hacking attack on the US Department of Defense on June 15, 2014. The law […]
A cyber resilience approach: the need to become cyber resilient is very essential because eliminating risks completely is impossible. Hacking emerged as a geeky, tech-oriented culture that was a little mischievous, but ultimately was about programming and finding faults or bugs in the code. It has evolved over time to become a criminal activity. The […]
Which is the cost of personal data in the criminal underground? How cyber criminals steal personal data? Which is the cashout process? What is the underground economy? Put simply, the underground economy is a collection of forums, chat rooms and custom-made websites that are all designed to facilitate, streamline and industrialize cybercrime. It’s within these […]
Cybercrime is a dangerous and attractive lifestyle for young cyber talents. Which are the strengths of a winning model that is hard to fight? The Director of the European police agency Europol, Rob Wainwright, has provided illuminating details on the evolution of the cyber criminal ecosystem. The number of cyber crimes is growing rapidly, their level […]
The annual IT security report issued by the German BSI reported that a sophisticated cyber attack on a steel factory caused severe damage. A cyber attack could cause serious damage to a production plant or a facility, we discussed several times this attack scenario that represents a nightmare for security experts and Intelligence agencies. The […]
A group of hackers claims to have compromised the national database system stolen all information related to citizens resident in Serbia. Hackers claim to have data about all citizens in Serbia, if the news is confirmed this is another clamorous data breach that could have serious repercussion on the Government. It seems that cyber criminals hacked […]