Home Tags Cyber Espionage

Tag: Cyber Espionage

Brother-and-sister duo arrested over hacking campaign targeting Italy’s bigwigs

EyePyramid operation targeted politicians and business leaders A hacking operation featuring the EyePyramid trojan successfully compromised the systems of numerous high-profile Italian targets, including two...

How to hunt for rare malware

At SAS 2017, on April 1st and 2nd on St. Maarten, Global Director of GReAT Costin Raiu and Principal Security Researchers Vitaly Kamluk and...

Insane blackhats behind world’s most expensive ransomware ‘forget’ to backup crypto...

Only Linux victims can decrypt warped $247,000 BlackEnergy module - and then only maybe Variants of the KillDisk data wiping malware, famous for nuking computers...

Kaspersky Security Bulletin 2016. Review of the year. Overall statistics for...

 Download Review of the year  Download Overall statistics  Download the consolidated Kaspersky Security Bulletin 2016 Introduction If they were asked to sum up 2016 in a single word,...

Caribbean scuba diving with IT-security in mind

Dare to submit your research proposal before December 1, 2016 to dive into undiscovered and uncharted cybercrimes, hacks, espionage and much more at the...

IT threat evolution Q3 2016

 Download the full report (PDF) Overview Targeted attacks and malware campaigns Dropping Elephant Targeted attack campaigns don’t need to be technically advanced in order to be successful.In July...

Shadow Brokers dump reveals NSA targets

Accompanying gibberish encourages disrupting US election The Shadow Brokers hacking group has posted a fresh dump containing a list of servers compromised by an NSA-linked...

Democralypse Now? US election first battle in new age of cyberwarfare

CIA said to blame Russia for voter database hacks Hacking attempts against more than 10 US state election databases have increased fears about Russian efforts...

Industry Group Issues Security Framework for Industrial IoT

The Industrial Internet Consortium's blueprint addresses security from multiple angles and touches on safety, reliability and privacy. The Industrial Internet Consortium has developed a framework...

White House Orders Probe of Election Database Breaches

NEWS ANALYSIS: A little-known cold war group is assigned to investigate suspected hacks into Democratic National Committee and state voter registration databases. The White House...

Should Leaked Exploits Be Revealed by the NSA?

Once attack tools are leaked, they are adopted rapidly by many attackers. Will the leaked NSA exploits quickly be used in an attack, and...

Threat intelligence report for the telecommunications industry

 Download PDF Introduction The telecommunications industry keeps the world connected.Telecoms providers build, operate and manage the complex network infrastructures used for voice and data transmission –...