Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

June 2012 Cyber Attacks Timeline (Part I)

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:9 mins read
  • Post published:June 18, 2012

Update 07/05/2012: June 2012 Cyber Attacks Timeline (Part II)

A (first half of the) month living dangerously…

June has come and strongly confirms that Summer is the preferred month for Cybercrookers: just look back at June 2011 and you will probably remember the days of Lulz of the infamous LulzSec Collective (which curiously seems to be reborn!).

June 2012 has shown a remarkable number of incidents and is proving to be a mensis horribilis (horrible month) for Social Networks and Online Services in general, due to the high profile breaches of LinkedIn, Last.Fm, eHarmony and the online game League of Legends.

On a geographic scale, looks like China is becoming another important source of Cyber incidents, having been targeted from #TeamGhostShell, who claim, inside their #ProjectDragonFly, to have obtained up to 800,000 accounts from different sources.

Hacktivism-led actions seem (apparently) to decline, whilst, on the Cyber Crime front, a new collective, UGNazi, is taking the scene, having confirmed, in the first part of June, the wake of cyber attacks, we have become familiar with for some time.

Another Infosec Summer promising to be very hot!

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timeline.

(more…)

Like this:

Like Loading...

Continue ReadingJune 2012 Cyber Attacks Timeline (Part I)

Hacking In The Time of Twitter

  • Post author:
  • Post last modified:August 5, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:3 mins read
  • Post published:August 5, 2011

So, after announcing an alleged hack to Italian Prison Guards, the threatening tweets anticipating the latest hack, have suddenly disappeared…

Continue ReadingHacking In The Time of Twitter

The Two Faces of Hacking

  • Post author:
  • Post last modified:July 20, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:5 mins read
  • Post published:July 20, 2011

My colleague Massimo Biagiotti suggested me this interesting matrix from IEEE which originally indicated some of the biggest and best…

Continue ReadingThe Two Faces of Hacking

The Mother Of All Breaches

  • Post author:
  • Post last modified:July 15, 2011
  • Post category:Cyberwar/Security
  • Post comments:6 Comments
  • Reading time:5 mins read
  • Post published:July 15, 2011

Update July 15: Reuters reports that hat a classified US military weapons system will now need to be redesigned after…

Continue ReadingThe Mother Of All Breaches
Copyright 2022 - HACKMAGEDDON.COM
 

Loading Comments...
 

    %d bloggers like this: