Great news! With this article, I have decided to change the timeline, moving from a static infographic-style format, to a tabular format, which allows to sort, filter and search for specific items inside the timeline.... Read More
If you are a user of Plex, you’d better change your password now. On Tuesday the developers of the Popular Media Server have sent out an email notification reporting that the sever hosting the forums and the blog has been compromised, and consequently all the users are required to change their password.... Read More
I know you were losing all your hopes… Don’t panic! Even if with a little delay, here we go with the 1-15 June Cyber Attacks timeline.
This first half of June has been quite troubled from an infosec standpoint, with a couple of events that overshadowed all the rest and that will be probably remembered for a long time (and who can tell how long the consequences will last), I am obviously talking about the breach(es) suffered by the Office Of Personnel Management and the cyber attack executed against Kaspersky using a revamped version of Duqu dubbed Duqu 2.0.
In information security, raw data is an important piece of information to understand the threat landscape, however it must be opportunely correlated to create value added.... Read More
In information security, a product demo is quite important inside the sales process. Normally conceived as a necessary step to show the product features and integration capabilities in a real world condition (hopefully with some well established success criteria), it often turns out to be a sort of red pill capable to show “how deep the rabbit hole goes”, in other terms, how many threats (more or less serious) have gone undetected until that moment.... Read More
The Office of Personal Management, the independent agency of the United States that manages the civil service of the federal government, will notify about 4 million current and former federal employees, that their personal data may have been compromised following an intrusion by state-sponsored hackers.... Read More
It’s finally time to publish the timeline of the main cyber attacks occurred in the second half of May.... Read More
During the football season, Monday morning is probably the most critical moment for a network administrator and the reason is pretty simple: after the match day, the first thing users normally when sitting at their desks (and powering on their computers) is to browse their preferred sport sites to watch the latest commentaries and the highlights of their beloved team.... Read More