Advanced Persistent Threats and Security Information Management
Advanced Persistent Threats are probably the most remarkable events for Information Security in 2011 since they are redefining the infosec landscape from both technology and market perspective. I...
View ArticleOctober 2011 Cyber Attacks Timeline (Part I)
October has come and here it is, also for this month, the first part of my Cyber Attacks Timeline covering the cyber events occurred in the first half of the current month. Three events in particular...
View ArticleNovember 2011 Cyber Attacks Timeline (Part II)
The second half of November has confirmed the trend seen in the previous report covering the first half of the month. The period under examination has confirmed a remarkable increase in Cyber Attacks...
View ArticleDecember 2011 Cyber Attacks Timeline (Part I)
As usual, here it is my compilation of December Cyber Attacks. It looks like that Christmas approaching is not stopping hackers who targeted a growing number of organizations including several...
View ArticleThe Alphabet of Cyber Crime from APT to Zeus
If you need to know what Cyber Crime is but you are bored and fed up with the too many information security terms, loosing yourself among the acronyms, you have stumbled upon the correct place. I have...
View ArticleFirst Adobe Reader 0-Day Bypassing Sandbox Protection In The Wild
Few Days ago, a Trend Micro Research Paper on the Russian Underground gave a scary landscape of the Underground Black Market showing that every hacking tool and service can be found at dramatically...
View Article1-15 November 2012 Cyber Attacks Timeline
The first half of November 2012 has been undoubtedly characterized by Hacktivism. Not only the month has begun with the ProjectBlackStar by the infamous Team Ghostshell (2.5 million accounts leaked...
View Article16-31 December 2012 Cyber Attacks Timeline
The year is gone, and here it is the last Cyber Attack Timeline for 2012 (first part here). The most important cyber-events of this second part of December can be considered: the third phase of the...
View ArticleFacebook Admits to Have Been Hit By a Sophisticated Targeted Attack
A couple of weeks after similar revelations made by Twitter, Facebook has joined the unwelcome list of Social Networks hit by targeted attacks. This news has shaken this quiet week end of February, as...
View Article1-15 April 2013 Cyber Attacks Timeline
I know, I am a little late this month. We have just entered May and I was able to publish the first part of the Timeline of April. I will try to maintain the usual rhythm and to be more punctual for...
View ArticleProcessor Assisted Or OS Embedded Endpoint Security?
Yesterday, September the 13th 2011, the Information Security Arena has been shaken by a couple of announcements earthquakes unleashed by two of the most important players in this market. The first...
View ArticleSeptember 2011 Cyber Attacks Timeline (Part I)
So here it is, also for this month, the first part of My Cyber Attacks Timeline covering the first half of September. Apparently It looks like the wave of the Anonymous attacks that characterized...
View ArticleSeptember 2011 Cyber Attacks Timeline (Part II)
Here it is the second part of my traditional monthly Cyber Attacks Timeline (Part I available here). From an information Security Perspective the main events of this month were the infamous Diginotar...
View Article
More Pages to Explore .....