The State Department has taken the unprecedented step of shutting down its entire unclassified email system in response to a suspected cyber attack. The State Department has decided of shutting down its entire unclassified email system in response to a suspected cyber attack. A senior department official at the State Department, which reported the facts on […]
Experts at F-Secure discovered a link between the crew operating a rogue Tor node used to spread OnionDuke malware and MiniDuke APT. A few weeks ago the security research Josh Pitts of Leviathan Security Group identified a Russian Tor exit node that is patching the binaries downloaded by the users with malware. The researcher informed officials […]
Aussie spooks have warned of âreal and persistentâ cyberattacks on participants of the upcoming G20 conference in Brisbane. World leaders have been advised to man their devices closely while the Australian public is on a code red alert for an eminent threat. Months after alleged Russian government backed hackersâ targeted NATO computers and European Governments […]
FireEye CEO David DeWalt explained that threat actors are targeting IT giants for source code and highlighted the importance to adopt new security model. Phishing is a common practice in the hacking community, despite the level of awareness of the threat is high, the efficiency of the attacks is still significant. As highlighted in the […]
Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve RAT. Security experts at FireEye observed a new malicious campaign that is targeting non-profit organizations and non-governmental organizations by compromising legitimate website. The threat actors use to compromise legitimate websites to host iframes used to hijack visitors […]
An independent researcher has analyzed for years the metadata on submissions to VirusTotal service identifying patterns related to many bad actors. VirusTotal is the Google owned company which offers free checking of URLs and files for viruses and other malicious code, its systems use up to 54 different antivirus software to scan files and URLs provided by the userscheck. Cyber criminals […]
Nuclear Regulatory Commission systems were hacked three times in the last three years. According to investigators the bad actors are foreign hackers. U.S. Nuclear Regulatory Commission (NRC) has been hit by cyber attacks three times during the past three years, bad actors behind the offensives have conducted spear phishing attacks to compromise the internal network […]
Experts at Kaspersky discovered that Stuxnet exploits targeting a Windows Shell Vulnerability is still largely used in cyber attacks. Stuxnet has changed the history of malware development, it is considered the fist cyber weapon used by a government in an act of Information Warfare. As remarked by most popular security experts, the militarization of the […]
Project Zero is the new initiative announced by Google. The company is hiring the top security experts to make the Internet a more secure place. Google has publicly announced a new program called âProject Zero,â an ambitious project which involves a team of Star Hackers and Bug Hunters with the purpose to improve security of the […]
Security researchers at AIRBUS have uncovered a new APT, named Pitty Tiger, involved in a cyber espionage campaign which targeted mainly private companies. Security experts at AIRBUS Defence & Space â CyberSecurity unit have recently disclosed the results of their investigation on a new APT dubbed Pitty Tiger involved in a cyber espionage campaign which targeted mainly private companies. Also in […]