Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Looking Back…

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:11 mins read
  • Post published:January 13, 2012

Actually this post is nearly a couple of weeks in delay (last week I was skiing in at the Italian…

Continue ReadingLooking Back…

May 2012 Cyber Attacks Timeline (Part II)

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:8 mins read
  • Post published:June 4, 2012

As usual, here it is the second part of the Cyber Attacks Timeline for the month of May 2012: a month particularly rich of Cyber Events. As you will probably know, the Flame malware has monopolized the attention, deserving the most attention from the Information Security Professional.

Nevertheless the scene has offered many interesting events, among which it worths to mention the breach of 123,000 federal employees records, the breach affecting University of Nebraska, and, last but not least, the breach against WHCMS (which, as we will soon see, has proved to be fatal for its author).

The hacktivist front is still hot and preannounces another hot summer. On the other hand the authors of several remarkable cyber-criminal actions are probably going to leave the scene: the long trail of arrests made by Law Enforcement Agencies against hackers has continued in this month and has hence led to the arrest of Cosmo, the leader of the infamous group UGNazi, which claimed to be the author of the Cyber Attack against WHCMS.

In your opinion are the arrests against hackers really going to stop the growing number of Cyber Attacks (acting as a deterrent)?

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

After the jump you find all the references, and at this link the first part covering 1-15 May.

(more…)

Like this:

Like Loading...

Continue ReadingMay 2012 Cyber Attacks Timeline (Part II)

XML Encryption Cracked!

  • Post author:
  • Post last modified:October 23, 2011
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:5 mins read
  • Post published:October 23, 2011

We have not completely assimilated the BEAST vulnerability, and here it comes, from Bochum, Germany, another serious flaw involving Encryption,…

Continue ReadingXML Encryption Cracked!

Advanced Persistent Threats and Security Information Management

  • Post author:
  • Post last modified:October 13, 2011
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:7 mins read
  • Post published:October 13, 2011

Advanced Persistent Threats are probably the most remarkable events for Information Security in 2011 since they are redefining the infosec…

Continue ReadingAdvanced Persistent Threats and Security Information Management

Information, The Next Battlefield

  • Post author:
  • Post last modified:October 5, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:3 mins read
  • Post published:October 5, 2011

Today the Information Security Arena has been shaken by two separate, although similar, events: IBM and McAfee, two giants in…

Continue ReadingInformation, The Next Battlefield

Some Random Thoughts On The Security Market

  • Post author:
  • Post last modified:May 10, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:8 mins read
  • Post published:May 10, 2011

The intention by UK-headquartered company Sophos to acquire Astaro, the privately-held security company co-headquartered in Karlsruhe, Germany and Wilmington, Massachusetts…

Continue ReadingSome Random Thoughts On The Security Market

Driving Through The Clouds

  • Post author:
  • Post last modified:April 8, 2011
  • Post category:Cloud/Security
  • Post comments:1 Comment
  • Reading time:6 mins read
  • Post published:April 8, 2011

How many times, stuck in traffic on a hot August day, we hoped to have a pair of wings to…

Continue ReadingDriving Through The Clouds

Application Security: What’s Next?

  • Post author:
  • Post last modified:April 6, 2011
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:5 mins read
  • Post published:April 6, 2011

In the wake of the infamous LizaMoon which has flooded an impressive number of databases all over the world with…

Continue ReadingApplication Security: What’s Next?

La Città (Verde) Tra Le Nuvole

  • Post author:
  • Post last modified:March 11, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:6 mins read
  • Post published:March 11, 2011

Il titolo dell'articolo apparentemente richiama la romantica Cloud City, città tra le nuvole che contraddistingue le gesta di Han Solo…

Continue ReadingLa Città (Verde) Tra Le Nuvole

Il Cloud? E’ appena NATO!

  • Post author:
  • Post last modified:December 24, 2010
  • Post category:Cloud
  • Post comments:0 Comments
  • Reading time:2 mins read
  • Post published:December 24, 2010

Il 2011 sarà l'anno della definitiva consacrazione del Cloud (soprattutto per le implicazioni di sicurezza). A conferma di questo arriva…

Continue ReadingIl Cloud? E’ appena NATO!
  • 1
  • 2
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM
 

Loading Comments...
 

    %d bloggers like this: