Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

May 2012 Cyber Attacks Statistics

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:June 10, 2012

As I did last month for the Cyber Attacks occurred in April, I have aggregated the data collected on the…

Continue ReadingMay 2012 Cyber Attacks Statistics

Sixteen Months of Cyber Attacks in Italy

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:June 5, 2012

Tomorrow, during the 2012 Security Summit, Edition of Rome, the June Update of the 2012 Italian Report on ICT Security…

Continue ReadingSixteen Months of Cyber Attacks in Italy

May 2012 Cyber Attacks Timeline (Part II)

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:8 mins read
  • Post published:June 4, 2012

As usual, here it is the second part of the Cyber Attacks Timeline for the month of May 2012: a month particularly rich of Cyber Events. As you will probably know, the Flame malware has monopolized the attention, deserving the most attention from the Information Security Professional.

Nevertheless the scene has offered many interesting events, among which it worths to mention the breach of 123,000 federal employees records, the breach affecting University of Nebraska, and, last but not least, the breach against WHCMS (which, as we will soon see, has proved to be fatal for its author).

The hacktivist front is still hot and preannounces another hot summer. On the other hand the authors of several remarkable cyber-criminal actions are probably going to leave the scene: the long trail of arrests made by Law Enforcement Agencies against hackers has continued in this month and has hence led to the arrest of Cosmo, the leader of the infamous group UGNazi, which claimed to be the author of the Cyber Attack against WHCMS.

In your opinion are the arrests against hackers really going to stop the growing number of Cyber Attacks (acting as a deterrent)?

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

After the jump you find all the references, and at this link the first part covering 1-15 May.

(more…)

Like this:

Like Loading...

Continue ReadingMay 2012 Cyber Attacks Timeline (Part II)

The 2010 Olympic Games

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:June 4, 2012

Two months again and the World will assist to the 2012 London Olympic Games. Unfortunately the same is not true…

Continue ReadingThe 2010 Olympic Games

Israel Blamed for Fueling the Flame Cyber Weapon in Middle East

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:May 29, 2012

The day after its discovery, there are few doubts that the infamous malware dubbed Flame (or sKyWIper) has been developed…

Continue ReadingIsrael Blamed for Fueling the Flame Cyber Weapon in Middle East

A Flame on the Cyberwarfare Horizon

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:6 Comments
  • Reading time:5 mins read
  • Post published:May 28, 2012

Irony of fate: not even a day after the publication of a provocative article on the role of Cyber Warfare…

Continue ReadingA Flame on the Cyberwarfare Horizon

Cyberwarfare and the Principle of Deterrence

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:2 Comments
  • Reading time:4 mins read
  • Post published:May 27, 2012

Cyberwarfare is generally considered asymmetric since, in theory, inside the cyber world "size does not matter" and a smaller and…

Continue ReadingCyberwarfare and the Principle of Deterrence

Botnets, ISPs, and The Role of The Cloud

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:May 24, 2012

One interesting comment on my previous post on Botnets, gave me a cue for another consideration concerning the role of…

Continue ReadingBotnets, ISPs, and The Role of The Cloud

I, BOT (Coming To A C&C Server Near You)

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:6 mins read
  • Post published:May 22, 2012

Few days ago I have discovered that the City I live in (Rome), ranks at number two in the World…

Continue ReadingI, BOT (Coming To A C&C Server Near You)

1-15 May 2012 Cyber Attacks Statistics

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:4 mins read
  • Post published:May 20, 2012

As I did in the last month, I have summarized the data collected in my Cyber Attacks Sample for the…

Continue Reading1-15 May 2012 Cyber Attacks Statistics
  • Go to the previous page
  • 1
  • …
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • …
  • 59
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM
 

Loading Comments...
 

    %d bloggers like this: