stuxnet

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on IranThe role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

Journalists revealed the role of a mole recruited by the Dutch intelligence in the US-Israeli Stuxnet attack on the Natanz…

6 years ago
Iran hit by a more aggressive and sophisticated Stuxnet versionIran hit by a more aggressive and sophisticated Stuxnet version

Iran hit by a more aggressive and sophisticated Stuxnet version

Iran's strategic network was hit by a new destructive and sophisticated version of the Stuxnet cyber weapon, the Hadashot TV reports.…

7 years ago
Dragonfly 2.0: the sophisticated attack group is back with destructive purposesDragonfly 2.0: the sophisticated attack group is back with destructive purposes

Dragonfly 2.0: the sophisticated attack group is back with destructive purposes

While the first Dragonfly campaigns appear to have been a more reconnaissance phase, the Dragonfly 2.0 campaign seems to have destructive…

8 years ago
Microsoft Attempts To Fix Stuxnet For The Third TimeMicrosoft Attempts To Fix Stuxnet For The Third Time

Microsoft Attempts To Fix Stuxnet For The Third Time

Microsoft released a new security update on June 17th in an attempt to patch a vulnerability which allowed the Stuxnet…

8 years ago
The Stuxnet vulnerability is still one of the most exploited flaws in the wild by hackersThe Stuxnet vulnerability is still one of the most exploited flaws in the wild by hackers

The Stuxnet vulnerability is still one of the most exploited flaws in the wild by hackers

A new report published by Kaspersky confirms that Stuxnet exploits targeting a Windows Shell Vulnerability is still widely adopted by…

8 years ago
The alleged link between the Shadow Brokers data leak and the Stuxnet cyber weaponThe alleged link between the Shadow Brokers data leak and the Stuxnet cyber weapon

The alleged link between the Shadow Brokers data leak and the Stuxnet cyber weapon

Security researchers who analyzed the documents and hacking tools included in the last Shadow Brokers dump found a link to…

8 years ago
Malware posing as Siemens PLC application is targeting ICS worldwideMalware posing as Siemens PLC application is targeting ICS worldwide

Malware posing as Siemens PLC application is targeting ICS worldwide

Findings of the MIMICS project conducted by Dragos Threat Operations Center show a malware posing as Siemens PLC application is…

8 years ago
SCADA Sssh! Don’t Talk, Filter itSCADA Sssh! Don’t Talk, Filter it

SCADA Sssh! Don’t Talk, Filter it

The effects of cyber-attacks against SCADA/ICS are well known, however, there is a great confusion when dealing with mitigation techniques.…

9 years ago
Shocking, a German nuclear plant suffered a disruptive cyber attackShocking, a German nuclear plant suffered a disruptive cyber attack

Shocking, a German nuclear plant suffered a disruptive cyber attack

A German nuclear plant suffered a disruptive cyber attack, the news was publicly confirmed by the IAEA Director Yukiya Amano.…

9 years ago
A malware was found in Iran petrochemical complexes, but it’s not linked to recent incidentsA malware was found in Iran petrochemical complexes, but it’s not linked to recent incidents

A malware was found in Iran petrochemical complexes, but it’s not linked to recent incidents

The head of Iran’s civilian defense confirmed that a malware was found in petrochemical complexes, but it hasn't caused the…

9 years ago