It’s Monday Morning, Don’t Set Your Human Firewall to “Allow Any Any”

During the football season, Monday morning is probably the most critical moment for a network administrator and the reason is pretty simple: after the match day, the first thing users normally when sitting at their desks (and powering on their computers) is to browse their preferred sport sites to watch the latest commentaries and the highlights of their beloved team.... Read More

North Korean Cyber Capabilities Could Soon Cause Physical Damages

In an exclusive interview to BBC, a key defector of the North Korean regime, Prof Kim Heung-Kwang, has given an updated overview of Pyongyang cyber capabilities.... Read More

Worldwide Security Software Market Reached $21.4 Billion in 2014

Worldwide security software revenue totaled $21.4 billion in 2014, showing a 5.3 percent increase from 2013 revenue of $20.3 billion, according to Gartner report “Market Share Analysis: Security Software, Worldwide, 2014.”... Read More

New Web Site and Updated Page for the 2015 Master Index

I just completed the migration of my blog to a new platform, and took this opportunity to update the 2015 Cyber Attack Master Index with the 2015 Cyber Attacks Master Index.... Read More

1-15 May 2015 Cyber Attacks Timeline

It’s time for the first timeline of May, reporting the main cyber attacks occurred between 1 and 15 May 2015.

The Summer is at the gates, but apparently the nice weather is not stopping the attackers from their intentions: I have recorded 52 attacks, a dramatic turnaround in comparison with April, and a strong indication that the slowing trend of the past couple of months has suffered a sudden stop.

read more

April 2015 Cyber Attacks Statistics

Country DistributionEven if I am little late, I can finally publish the statistics derived from cyber attacks timelines of April (Part I and Part II).... Read More

16-30 April 2015 Cyber Attacks Timeline

It’ s time to publish the timeline with the main cyber attacks occurred in April 2015 (Part I here).

Despite the number of attacks has shown a decreasing trend, this second part of April will be probably remembered for the Cyber Espionage campaigns, which, in a couple of cases, have successfully hit the White House, a coveted target for Russian hackers. Other remarkable events in this space include the return of APT 28 (Operation Russian Doll) and an operation carried on by Arabic-speaking attackers, targeting Israeli military networks.

read more

1-15 April 2015 Cyber Attacks Timeline

Spring is sprung, but unfortunately the nice season is not enough to keep the crooks’ hands off their keyboard, as the growing trend continues, and this first half of April has shown a sustained number of attacks.

The most illustrious victim is Lufthansa, whose frequent-flyers website has been hacked, with the attackers able to harvest miles from the unaware victims. Other noticeable events, always related to cyber crime, include the compromise of Linux Australia, and the discovery of Operation Buhtrap, a campaign targeting Russian banks.

read more

March 2015 Cyber Attacks Statistics

Country DistributionIt’s time to aggregate the two Cyber Attack Timelines for March 2015 (Part I and Part II) into statistics.... Read More

16-31 March 2015 Cyber Attacks Timeline

I am back in business after a short vacation period (now and then it happens!), just in time to publish the second Cyber Attack timeline of March (the first one is here), which confirms the growing trend we have been experiencing in 2015.

Two weeks packed with events, started in the worst possible way, with the massive cyber attack against Premera Blue Cross (11 million customers affected), and continued with the same baffling trend, since the list of organizations targeted by massive breaches, includes other primary companies such as British Airways, Slack and Twitch (an Amazon-owned game video streaming service).

read more

I know with what weapons World War III will be fought…

%d bloggers like this: