The Perfect Storm
I have decided to create a new timeline tracking the high-impact vulnerabilities targeting both remote access and on-premise technologies exploited...
I have decided to create a new timeline tracking the high-impact vulnerabilities targeting both remote access and on-premise technologies exploited...
Click here for part 2.
New year, new Cyber Attacks Timeline. Let us start our Information Security Travel in 2012 with the chart of the attacks occurred in the first fifteen days of January. This month has been characterized so far by the leak of Symantec Source Code and the strange story of alleged Cyber Espionage revolving around it. But this was not the only remarkable event: chronicles tell the endless Cyber-war between Israel and a Saudi Hacker (and more in general the Arab World), but also a revamped activity of the Anonymous against SOPA (with peak in Finland). The end of the month has also reserved several remarkable events (such as the breaches to T-Mobile and Zappos, the latter affecting potentially 24,000,000 of users). In general this has been a very active period. For 2012 this is only the beginning, and if a good beginning makes a good ending, there is little to be quiet…
Browse the chart and follows @paulsparrows to be updated on a biweekly basis. As usual after the jump you will find all the references. Feel free to report wrong/missing links or attacks.
Targeted attacks exploiting endpoint vulnerabilities are becoming more and more common and increasingly aggressive. For this reason I could not…
Advanced Persistent Threats are probably the most remarkable events for Information Security in 2011 since they are redefining the infosec…
It has been recognized that mobile technologies have had a significant impact on the events that occurred in North Africa.…
Questa mattina, il buongiorno non ce lo porta l'aroma di caffè e un bel croissant al burro, ma l'ennesima nota…
Non c'e' dubbio, le facili previsioni che davano l'Androide al centro dei problemi di sicurezza per il 2011 hanno centrato…