cyber espionage
China reacts to military hackers’ indictment, accuses US of hypocrisy
Yesterday, for the first time ever, the US Justice Department filed criminal charges against known state actors for hacking, as it accused five Chinese military hackers of …
Five Chinese military hackers charged for spying on US firms
A grand jury in the Western District of Pennsylvania indicted five Chinese military hackers for computer hacking, economic espionage and other offenses directed at six …
Industries on the cyber war front line
ThreatTrack Security published a study that looks at the security vulnerabilities of two industries most often targeted by cybercrime: energy and financial services. 72% of …
Researchers share details about recent IE 0-day exploit and its delivery
Given that Microsoft has closed the Internet Explorer 0-day vulnerability that was exploited to compromise US-based defense and financial firms, the Sourcefire vulnerability …
Flash 0-day exploited in watering hole attacks, Adobe provides patch
Adobe has pushed out new versions of Flash Player for Windows, Mac and Linux, as a newly discovered zero-day vulnerability affecting the software is being actively exploited …
IE 0-day exploit actively used in attacks against US-based firms
Late on Saturday, Microsoft has published a security advisory warning about “limited, targeted attacks” exploiting a newly discovered zero day vulnerability that …
Motivation and techniques of world’s most sophisticated cyber attackers
CrowdStrike released “CrowdStrike Global Threats Report: 2013 Year in Review,” the product of its year-long study of more than 50 groups of cyber threat actors. …
EFF staff targeted in state-sponsored espionage campaign
For the first time since the organisation’s inception, Electronic Frontier Foundation’s staffers have been hit with a targeted malware attack by what appear to be …
NSA compromised 50,000 global computer networks
The NSA has managed to compromise over 50,000 computer networks in its effort to keep abreast of the political, military and economic situation around the world, Dutch daily …
Large-scale net traffic misdirections and MitM attacks detected
Man-In-the-Middle BGP route hijacking attacks are becoming regular occurrences, but it’s still impossible to tell who is behind them, and what their ultimate goal is, …
The dangers of weakening cybersecurity to facilitate surveillance
In response to the controversy over the alleged surveillance practices of the NSA, the White House established the Review Group on Intelligence and Communication Technologies, …
Russia handed malware-laden devices to G20 delegates?
At the G20 summit held near St. Petersburg in September, attending delegates representing the 20 most powerful nations in the world have been handed gifts that included …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments