Blog Posts Tagged with "Cyber Espionage"

306708aaf995cf6a77d3083885b60907

FireEye Reveals APT30: A Decade-Long Cyber Espionage Campaign Targeting South East Asia

April 12, 2015 Added by:Mike Lennon

FireEye on Sunday uncovered details of a decade-long cyber espionage campaign carried out by China targeting governments, journalists and businesses in South East Asia and India.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iran and India, control and monitoring of networks

January 08, 2013 Added by:Pierluigi Paganini

The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that low enforcement of the country is developing a software for "smart control" of social-networking sites, the authorities have understood that the control of the powerful platforms is more important filtering.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Japan Aerospace Exploration Agency hit again by malware

December 03, 2012 Added by:Pierluigi Paganini

The New Your Times has recently published the news the Japan Aerospace Exploration Agency was hit by a virus that stolen secret information on newest rockets from an internal computer...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Our Massively Dysfunctional Cyber System

November 28, 2012 Added by:Joel Harding

What should be done to stop theft of intellectual property by state actors (China) would require a Presidential Finding but our leadership structure is devoid of real leaders. That is not a political statement, that is a statement about our country...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Reverse Deception: Organized Cyber Threat Counter-Exploitation

November 14, 2012 Added by:Ben Rothke

Every organization of size and scope is a target, and many of the world’s largest firms and governments have been victims. In Reverse Deception: Organized Cyber Threat Counter-Exploitation, Dr. Max Kilger and his co-authors provide an effective counterintelligence approach in which to deal with APT...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Flame, miniFlame, the mystery of an on going cyber espionage campaign

October 16, 2012 Added by:Pierluigi Paganini

Last May The Iranian Computer Emergency Response Team (MAHER) detected a new malware which hit the country named Flame, also known as Flamer or Skywiper. Kaspersky Lab and CrySyS Lab also identified the malware, recognized as a powerful cyber espionage tool that hit mainly Windows systems in the Middle East...

Comments  (0)

94c7ac665bbf77879483b04272744424

Concerted Chinese Government Attacks or Just Another Day?

October 01, 2012 Added by:Marc Quibell

Front page news headlines today: "Chinese Hackers Breach White House!" For a split second there I was almost concerned; and then after reading I thought to myself...blah another false alarm. What did I expect?

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Energy Sector Cyber Espionage: Chinese Hackers are not Alone

September 29, 2012 Added by:Pierluigi Paganini

Since last month a new campaign of cyber attacks have hit the Energy sector, all is started with the incidents to Saudi Aramco and RasGas companies, in both cases a malware infected internal networks without impacting on the production systems...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

The Wicked Witches of Cyberspace

September 27, 2012 Added by:Joel Harding

Lately I’ve been doing a deep dive on technologies that enable one to bypass filters, blocking and jamming, to get uncensored information into denied areas. When we use these technologies it is on behalf of goodness, apple pie and the American way. When someone else does its nefarious...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

State-Sponsored Attacks or Not? That's the Question...

September 18, 2012 Added by:Pierluigi Paganini

Despite the use of cyber weapons and the damage caused by offensive operations being major concerns for intelligence agencies, clues are frequently discovered about attacks designed to steal sensitive information and intellectual property. Who is behind these cyber attacks?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Rapid 7 Analysis of Data Breach Incidents

September 11, 2012 Added by:Pierluigi Paganini

Excluding attacks by foreign governments and cyber criminals that exploit 0-days, with best practices and the adoption of compliance at the current standard, in matters of security it is possible to avoid data breach incidents, or at least reduce the amount of exposed information...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Elderwood Project: Who is Behind Aurora and Ongoing Attacks?

September 10, 2012 Added by:Pierluigi Paganini

The attacks appeared to be originated in China and aimed at dozens of other organizations who were hit, of which Adobe Systems and Juniper Networks confirmed the incident. The press is also convinced that other companies were targeted such as Morgan Stanley, Northrop Grumman and Yahoo...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Three Days of The Condor... With Malware

September 07, 2012 Added by:Infosec Island Admin

Pandora’s box has been opened. All the players are taking the field, and many of them may not be ready to play a proper game… Shamoon did it’s thing, but it seems to be more a brute force tool than an elegant piece of code and a slick plan. The blowback though is yet to be determined...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

OPSEC: Is the Juice Worth the Squeeze?

September 06, 2012 Added by:Joel Harding

In the cyber world there is a process called IGL or Intelligence Gain-Loss. Sometimes deploying a new tool would disclose a capability that the US has to gather intelligence, but sometimes the gain outweighs the loss of a source. Ya gotta ask is the juice worth the squeeze?

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Our Cyber Dysconnect

September 03, 2012 Added by:Joel Harding

The fact is our governments all talk across one another instead of honestly exchanging data. You, me, the engineer in the office down the hall or the President of this country or that, we can all talk about how bad things are but until we have agreed upon terms and can honestly compare apples with oranges, all we are using are empty words

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

U.S. Admits to Cyber Attacks: The Future of Conflict

August 28, 2012 Added by:Pierluigi Paganini

“As a commander in Afghanistan in the year 2010, I was able to use my cyber operations against my adversary with great impact... I was able to get inside his nets, infect his command-and-control, and in fact defend myself against his almost constant incursions to get inside my wire, to affect my operations...”

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »