Blog Posts Tagged with "Tilded"

03b2ceb73723f8b53cd533e4fba898ee

Mahdi and AC/DC: The Middle East as a Shooting Range

July 30, 2012 Added by:Pierluigi Paganini

In Middle East, the number of malware that have been developed for state sponsored projects surely represents an anomaly. All the examples provided are evidence of the intent of governments to hit their enemies in the cyberspace to steal sensitive information or to destroy their critical infrastructure...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Researchers: Flame Malware Shares Stuxnet Virus Module

June 11, 2012 Added by:Headlines

"Despite the fact that Stuxnet has been the subject of in-depth analysis... the mysterious 'resource 207' from 2009 has gone largely unnoticed. But it turns out that this is the missing link between Flame and Stuxnet... Clearly, these two pieces of exploit code were written by the same programmer..."

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Second Annual Cyber Security Summit (Prague) Write-up

April 15, 2012 Added by:Robert M. Lee

An important aspect of the conference was the ability to network with people from a wide variety of sectors. Establishing new connections, sources of information, and building friendships opens up avenues for much needed information sharing. Emphasis must be placed on education...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Ten Takeaways from the Tilded Platform

April 02, 2012 Added by:Robert M. Lee

Stuxnet had a major impact on ICS/SCADA. It revealed vulnerabilities that many cyber security experts in that community had been warning about for years. Moreover, it showed that nation-states are willing to target these systems if it helps the success of a mission...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Duqu Cyber Weapons Factory Still Operating

March 29, 2012 Added by:Pierluigi Paganini

I graphed the data supplied by leading teams involved in research on Duqu. Does the fact that the majority of instances have been identified in Sudan and Iran suggest something? Have you still doubts about who may have developed this powerful family of cyber weapons?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Implications of Malware-as-a-Service

January 25, 2012 Added by:Pierluigi Paganini

Criminal operations are managed as corporations and malware is designed as a service, with a maniacal attention paid to product quality. The life cycle is the most amazing aspect: From design, release, to after sales support - each stage is implemented with care and attention...

Comments  (0)