- By Catalin Cimpanu
- September 21st, 2016
German Politicians Targeted with Spyware over the Summer
Attacker posed as NATO employee, used a spoofed NATO email
- By Catalin Cimpanu
- September 14th, 2016
Nation-State Actors Are Probing Core Internet Infrastructure for Failure Points
Schneier suspects China and Russia are behind the attacks
- By Catalin Cimpanu
- September 13th, 2016
NOPEN Is the Equation Group's Backdoor for Unix Systems
NOPEN has central role in Equation Group operations
- By Catalin Cimpanu
- September 7th, 2016
APT3 Deploys an Arsenal of Hacking Tools Against Hong Kong Targets
Group most likely linked to Chinese government
- By Catalin Cimpanu
- September 6th, 2016
US State Election System Hacks Connected to Ukraine Power Grid Attacks
Also connected to attacks against Turkey's ruling party
- By Catalin Cimpanu
- September 2nd, 2016
Chinese Group APT3 Targets Hong Kong Government Before Upcoming Elections
Tensions rise in Hong Kong before parliamentary elections
- By Catalin Cimpanu
- August 31st, 2016
Washington Think Tank Organizations Hacked by APT29
Attacks carried out by one the groups that hacked the DNC
- By Catalin Cimpanu
- August 29th, 2016
Multiple Australian Government Agencies Compromised in the Last Five Years
Australian authorities point the finger firmly at China
- By Catalin Cimpanu
- August 29th, 2016
Malware Not to Blame for Recent Fires at Iranian Petrochemical Plants
Iran officials: This is not a Stuxnet-like incident
- By Catalin Cimpanu
- August 25th, 2016
Spyware Sold to Governments Behind Recent iOS Zero-Days
Apple fixes three zero-days used by Pegasus spyware
- By Catalin Cimpanu
- August 24th, 2016
Russian State Hackers Tried to Hack New York Times and Other Reporters
NYT admins to cyber-attacks against its Moscow bureau
- By Catalin Cimpanu
- August 23rd, 2016
Russia Behind World Anti-Doping Agency & International Sports Court Hacks
Anonymous Poland might be a sockpuppet account
- By Catalin Cimpanu
- August 23rd, 2016
List of Equation Group Files Leaked by Shadow Brokers
A compendium of what was included in the dumped files
- By Catalin Cimpanu
- August 19th, 2016
Computer Science Professor Gives Failing Grade to Newly Leaked NSA Hacking Tool
It appears that the NSA will need some better coders
- By Catalin Cimpanu
- August 19th, 2016
New Snowden Documents Link Shadow Brokers Leak to Official NSA Hacking Tools
This particular exploit was used in Pakistan and Lebanon
- By Catalin Cimpanu
- August 19th, 2016
Did the NSA Have the Ability to Extract VPN Keys from Cisco PIX Firewalls?
The answer is YES, according to LulzSec co-founder
- By Catalin Cimpanu
- August 16th, 2016
Kaspersky Says Shadow Brokers Leaked Malware Is Authentic
Security vendor that detected and analyzed Equation Group malware says The Shadow Brokers leak is authentic