Category Archives: Cyberwar

An Additional Compilation of Attack Maps (Including a Tool to Build Your Own)

Finally let’s close this series of posts dedicated to the attack maps made available by security vendors (Part I and Part II) with an additional compilation of more useful resources (once again reported in rigorous alphabetical order).... Read More

It’s Still a World of Botnets and Cyber Attacks

Big data analysis has become a very powerful weapon in the hands of security companies: the ability to process in real time a huge amount of information collected by a global network of sensors allows to build predictive models (in contrast to traditional static signature/blacklist-based approaches) and to distribute the countermeasures at an unprecedented speed.... Read More

The Same Attacker Behind the Breaches Against Hacking Team and Gamma International

The alleged author of the huge breach against Hacking Team in which 400 Gb of data were leaked, has come out of stealth, posting a series of tweets in which he claimed responsibility for the attack:... Read More

OPM Breach Discovered During a Product Demo (and Undetected for Over a Year)

In information security, a product demo is quite important inside the sales process. Normally conceived as a necessary step to show the product features and integration capabilities in a real world condition (hopefully with some well established success criteria), it often turns out to be a sort of red pill capable to show “how deep the rabbit hole goes”, in other terms, how many threats (more or less serious) have gone undetected until that moment.... Read More

Chinese Hackers Hit the Office of Personnel Management (Again): 4 Million Records Compromised

The Office of Personal Management, the independent agency of the United States that manages the civil service of the federal government, will notify about 4 million current and former federal employees, that their personal data may have been compromised following an intrusion by state-sponsored hackers.... Read More

North Korean Cyber Capabilities Could Soon Cause Physical Damages

In an exclusive interview to BBC, a key defector of the North Korean regime, Prof Kim Heung-Kwang, has given an updated overview of Pyongyang cyber capabilities.... Read More

Deloitte Global Defense Outlook 2014: Cyber Operations Emerge as a Global Threat

[caption id="attachment_10043" align="alignleft" width="300"]Cyber Incident Cyber incidents by defense spending type, 2013. Source: Deloitte Global Defense Outlook 2014[/caption]

Deloitte has just released the Global Defense Outlook 2014. This independently developed report examines policies, practices, and trends affecting the defense ministries of 50 nations, and has been developed with publicly available information along with interviews with officials in government and industry, and analyses by Deloitte’s global network of defense professionals.... Read More

After Twitter and Facebook, Apple reveals to have suffered the same Cyber Attack

The same sophisticated cyber attack that has targeted Facebook and Twitter has also targeted Apple, according to an exclusive revelation by Reuters. In this latest occurrence,  the attackers were able to infect several Mac computers belonging to some employees of Cupertino, exploiting the same 0-Day Java vulnerability used to carry on the attacks against the two well known social networks.... Read More

The Quassam Group Stops the Cyber Attacks Against US Banks

Finally it looks like the DDoS attacks against US Banks, carried on by the Izz ad-Din al-Qassam Cyber Fighters in name of the infamous Operation Ababil, have been temporarily suspended. The decision is a consequence of the removal of the controversial video “The innocence of Muslim” from Youtube.

read more

Another Wiper Malware Discovered in Iran?

Yet another Sunday, yet another attack in Middle East.... Read More