cyber espionage
Large cyber espionage emanating from India
Norman Shark uncovered a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a …
Pentagon report accuses China military of cyber espionage
The Pentagon has come out and said it: “China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S. diplomatic, …
APT1 cyber espionage group is back to their old tricks
Despite Mandiant’s prediction that the release of their report on the attack methodology of the so-called APT1 (or “Comment Crew”) cyber espionage group …
U.S. judge says FBI can’t hack crime suspect’s computer
A judge of the U.S. District Court for the Southern District of Texas has denied FBI’s petition to install spying software on and using the built-in camera of an …
Data thieves and their motives
Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, according to a new Verizon report. Taking the top spot for all …
Ideas for deterring cyber espionage attacks
There has been much talk about whether the cyber espionage attacks should be considered acts of war, and about what can be done to prevent them. Retaliation being hard to …
Chinese university tied to “APT1” army cyber unit
By now everybody in the security industry has read the Mandiant APT1 report or at least a TEXTsummary of it, and has heard the many voices of either agreement or dissent …
Mandiant threat report on advanced targeted attacks
Mandiant released its fourth annual M-Trends report, which details the tactics used by threat actors to compromise organizations and steal data. It also highlights incident …
Older MiniDuke strain found, raises questions about its origins
A version of MiniDuke – the cyberspy malware aimed at governments and agencies in Europe and elsewhere – has been operating for at least 21 months, internet …
Old school malware used for spying on European govts
Kaspersky Lab’s team of experts published a new research report that analyzed a series of security incidents involving the use of the recently discovered PDF exploit in …
Featured news
Resources
Don't miss
- Strengthening security posture with comprehensive cybersecurity assessments
- Neosync: Open-source data anonymization, synthetic data orchestration
- Update your OpenWrt router! Security issue made supply chain attack possible
- Microsoft: “Hack” this LLM-powered service and get paid
- 8Base hacked port operating company Luka Rijeka