Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with sophisticated zero-day malware. According to a new report from Kaspersky Lab, this group, dubbed […]
Cyber warfare is becoming the most progressive warfare domain after the Second World War. Which global actors benefit the most from this capability. Cyber warfare is becoming the most progressive warfare domain after the Second World War. The progression of this concept brings us to the next milestone, to define which global actors benefit the […]
Researcher Kyle Wilhoit discovered a spike in traditional financial crimeware targeting ICS/SCADA networks attributing it to attack run by cyber criminals. The senior threat researcher with Trend Micro, Kyle Wilhoit, has recently discovered 13 different types of crimeware disguised as new versions for human machine interface (HMI) software for Siemens Simatic WinCC, GE Cimplicity, and Advantech device drivers. The […]
The annual IT security report issued by the German BSI reported that a sophisticated cyber attack on a steel factory caused severe damage. A cyber attack could cause serious damage to a production plant or a facility, we discussed several times this attack scenario that represents a nightmare for security experts and Intelligence agencies. The […]
Symantec has uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure operators. Backdoor Regin, is the name assigned by the experts at Symantec to an advanced spying tool that has been used in cyber espionage campaigns against governments, infrastructure operators, private companies, researchers, and private individuals. Regin appears […]
A group of Israeli researchers has demonstrated at the last Black Hat Conference how to hack air gapped networks by using lasers and drones. A lot of people believe that it is possible to secure a computer keeping it off, security specialists define a network separated by the Internet, or by any other unsecure networks, as “Air gapped […]
Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months. According to the ICS-CERT MONITOR report, which summarizes the Industrial Control Systems Cyber Emergency Response Team’s (ICS-CERT) activities between May â August 2014, threat actors had access to the systems of an unnamed manufacturing organization for […]
Experts at Kaspersky discovered that Stuxnet exploits targeting a Windows Shell Vulnerability is still largely used in cyber attacks. Stuxnet has changed the history of malware development, it is considered the fist cyber weapon used by a government in an act of Information Warfare. As remarked by most popular security experts, the militarization of the […]
Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of national security to develop advanced mitigation techniques and capabilities. The progenitor of Duqu, Flame and Gauss are reported as the authors of STUXNET. As illustrated, the trend of advancements between these four cyber weapons suggests […]
Sentinel Labs firm discovered a sophisticated malware dubbed Gyges that is the mixing of commercial malicious code with code of alleged cyber weapon. Experts at Sentinel Labs security firm have discovered Gyges malware in the wild in March 2014, the malicious code appears very sophisticated to the researches which attributed it to a state-sponsored project. The level of complexity […]