watering hole

LinkedIn – How to exploit social media for targeted attacksLinkedIn – How to exploit social media for targeted attacks

LinkedIn – How to exploit social media for targeted attacks

  The professional social network LinkedIn is a mine of information for any king of attackers, a Websense post described…

12 years ago
Israel – AP Exclusive reveals tunnel hit by cyber attackIsrael – AP Exclusive reveals tunnel hit by cyber attack

Israel – AP Exclusive reveals tunnel hit by cyber attack

Cybersecurity experts revealed that a major artery in Israel's national road network located in the northern the city of Haifa…

12 years ago
Subcontractors are for hackers the weakest link in security chainSubcontractors are for hackers the weakest link in security chain

Subcontractors are for hackers the weakest link in security chain

Hackers use to target subcontractors to hit big enterprises due the poor level of security they offer, in the energy…

12 years ago
Cyber Threat summit 2013 – Modern online-banking cybercrimeCyber Threat summit 2013 – Modern online-banking cybercrime

Cyber Threat summit 2013 – Modern online-banking cybercrime

"Modern online-banking cybercrime" -The presentation analyzes current context for cybersecurity in Banking focusing on cyber threats and countermeasures. Today I…

12 years ago
Reading IBM X-Force 2013 Mid-Year Trend and Risk ReportReading IBM X-Force 2013 Mid-Year Trend and Risk Report

Reading IBM X-Force 2013 Mid-Year Trend and Risk Report

IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on…

12 years ago
NetTraveler APT hackers still active improved their attacksNetTraveler APT hackers still active improved their attacks

NetTraveler APT hackers still active improved their attacks

Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack…

12 years ago
ICS-CERT Surge In attacks against Energy IndustryICS-CERT Surge In attacks against Energy Industry

ICS-CERT Surge In attacks against Energy Industry

The ICS-CERT issued a new Monitor report that revealed a surge of brute force attacks against control systems mainly belonging…

12 years ago
Watering hole attacks and exploit kits – Indian gov site caseWatering hole attacks and exploit kits – Indian gov site case

Watering hole attacks and exploit kits – Indian gov site case

Number of Watering hole attacks is increasing, most of them based on well known exploit kits. The case of compromised…

12 years ago
IE8 zero-day exploit targets U.S. nuke researchersIE8 zero-day exploit targets U.S. nuke researchers

IE8 zero-day exploit targets U.S. nuke researchers

Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working  on nuclear weapons research.…

12 years ago
CrySyS Lab revealed a decennial cyber espionage operation by TeamSpyCrySyS Lab revealed a decennial cyber espionage operation by TeamSpy

CrySyS Lab revealed a decennial cyber espionage operation by TeamSpy

Last week was monopolized by the discussion on cyber attacks that hit North and South Korea, but I found a news…

12 years ago