watering hole

Israel – AP Exclusive reveals tunnel hit by cyber attack

Cybersecurity experts revealed that a major artery in Israel's national road network located in the northern the city of Haifa…

11 years ago

Subcontractors are for hackers the weakest link in security chain

Hackers use to target subcontractors to hit big enterprises due the poor level of security they offer, in the energy…

11 years ago

Cyber Threat summit 2013 – Modern online-banking cybercrime

"Modern online-banking cybercrime" -The presentation analyzes current context for cybersecurity in Banking focusing on cyber threats and countermeasures. Today I…

11 years ago

Reading IBM X-Force 2013 Mid-Year Trend and Risk Report

IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on…

11 years ago

NetTraveler APT hackers still active improved their attacks

Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack…

11 years ago

ICS-CERT Surge In attacks against Energy Industry

The ICS-CERT issued a new Monitor report that revealed a surge of brute force attacks against control systems mainly belonging…

11 years ago

Watering hole attacks and exploit kits – Indian gov site case

Number of Watering hole attacks is increasing, most of them based on well known exploit kits. The case of compromised…

11 years ago

IE8 zero-day exploit targets U.S. nuke researchers

Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working  on nuclear weapons research.…

11 years ago

CrySyS Lab revealed a decennial cyber espionage operation by TeamSpy

Last week was monopolized by the discussion on cyber attacks that hit North and South Korea, but I found a news…

11 years ago

NIST – National Vulnerability Database website hacked

The news is curious as it is worrying, unknown hackers have violated the US government repository of standards based vulnerability…

11 years ago

This website uses cookies.