A study titled âIran:How a Third Tier Cyber Power Can Still Threaten the United States” states that Iran has sufficient cyber capabilities to attack the US Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical infrastructures of the country. The news doesnât surprise the cybersecurity experts that know very […]
FireEye report on the evolution of sophisticated cyber threats and their diffusion on global scale FireEye security firm has published another interesting report, titled “FireEye report -The Advanced Cyber Attack Landscape”, that provides an overview of advanced cyber attack landscape, these events are a widespread global activity and during 2012. FireEye experts detected  12 million malware communications seeking instructions, […]
Verizon has issued the â2013 Data Breach Investigations Reportâ that investigates on a series of documented data breaches. Verizonâs RISK Team, in collaboration with other 18 partners, has issued the â2013 Data Breach Investigations Reportâ that investigates on a series of documented data breaches. Since 2008 the company yearly publishes data related to principal incidents occurred during […]
A report titled âResilient Military Systems and the Advanced Cyber Threatâ written  by Defense Science Board (DSB), a Federal Advisory Committee established to provide independent advice to the Secretary of Defense, presented alarming scenarios on US nationâs military considered unprepared for a full-scale cyber-conflict. The 138-page report alerts Pentagon on the necessity to improve cyber […]
Every government conscious of strategic importance of cyber security and of the investments of other countries in cyber warfare capability is improving its effort. Last week I wrote about Russian government and the Putin’s request to reinforce the garrison of the fifth domain, the cyber space, through a series of investment to secure national critical infrastructures […]
Just one week ago a UN treaty was approved to update 24-year-old United Nations telecommunications rules. The agreement states that countries have the right to access international telecommunications services and control them to prevent cybercrimes such as spamming. The downside is that the UN treaty could open the doors to attitudes of censorship of governments […]
Cyber espionage is worldwide recognized one of the most concerning cyber threats mainly operated by governments to steal sensible information to foreign states and private companies. FireEye has revealed a cyber espionage campaign, named “Sanny“, attributable to Korea that hosts command-and-control (C&C) servers used in the attacks, the C&C channel is embedded on a legitimate page […]
This time I desire to speak about an interesting initiative of Group-IB company, a resident of the Moscow-based Skolkovo Foundation, that has received a grant in the amount of 30m rubles (approximately $966,000) for the development of a global counter-cybercrime system. The funds is co-financed by the Skolkovo Foundation which has provided 21m rubles ($676,000), […]
We have had many opportunities recently to discuss about zero-day vulnerabilities, their knowledge is guarantee of success for the attackers and represents in many cases the certainty to not to be discovered. The zero-day vulnerabilities are desirable for cybercrime that desires to find new ways to monetize cyber attacks, but also for state sponsored hackers […]
Last year I wrote about a new powerful surveillance system that Russian government committed to private business to implement a complex monitoring system, officially to prevent terrorist attacks against Russia. The day is come, today the system has been deployed officially to prevent on-line pedophilia but it obvious that a similar system is also able […]