US Ports are still vulnerable to cyber attacks that release dangerous chemicals, cybersecurity in the maritime industry is crucial for Homeland security. Critical infrastructure across the world are vulnerable to cyber attacks, this is not novelty, but it is interesting to explore how many infrastructure is open to hacking assaults. US ports are also vulnerable to cyber […]
According to a recent report issued by the Mehr news agency, more than 10,000 cyber attacks are detected by Iran every day, mostly from Israel. According to a recent report, more than 10,000 Internet security attacks are detected by cyber security experts in Iran every day, a country that is spending a significant effort to improve […]
NBC News reported Russian hackers have compromised computers at the Pentagon, an unclassified email system has been shut down in response of the attack. According to the NBC news, US officials have reported that Russia launched a “sophisticated cyberattack” against the Pentagon’s Joint Staff unclassified email system. The unclassified email system has been shut down […]
A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking platform. According RSA Security, a China-based virtual private network (VPN) service provider offers hacking crews a network of compromised servers which can be used to carry out stealth cyber attacks. The attacks appear to be […]
The NBC News published a secret NSA map reporting the locations of “Victims of Chinese Cyber Espionage” attacks that resulted in data thefts. The NBC News has published in exclusive a secret NSA map showing the locations of the cyber attacks carried out by Chinese hackers over a five-year period. Every marker in the secret NSA map […]
Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask the activities of their data-stealer malware. The hackers belonging to the APT 29 […]
Security researchers at Symantec have analyzed Seaduke, a sophisticated Trojan used by threat actors behind the “Duke” malware family. Security experts at Symantec security firm have analyzed the Trojan.Seaduke, a malware that was used by the APT group behind the Duke espionage campaigns that targeted numerous government organizations worldwide. The Seaduke has many similarities with other […]
The OPM announced that it has temporarily suspended its Electronic Questionnaires for Investigations Processing (e-QIP) system to fix a security flaw. According the results of a security audit conducted after the hack at the US Office of Personnel Management (OPM) the systems of the US Department are affected by a serious vulnerability. The vulnerable system is […]
Security researchers at the GData security firm discovered a second stage of the cyber attack on the German Bundestag that exploited a banking trojan to steal data. In the last weeks, I have reported the various news related to the cyber attack against the Bundestag and a possible involvement of Russian state-sponsored hackers. The media reported that […]
Government records stolen in the recent data breach at the US OPM (Office of Personnel Management) are surfacing from the Dark Web. While security experts speculate on the possible responsible for the recent data breach at US the Office of Personnel Management (OPM) the alleged data appeared in the dark web. I have personally found it on […]