Items Tagged with "Attacks"


296634767383f056e82787fcb3b94864

Who's Responsible for the Saudi Aramco Network Attack?

August 28, 2012 Added by:Jeffrey Carr

Iran is at the center of every significant aspect of this attack. It is the only nation with access to the original Wiper virus from which Shamoon was copied. Perhaps Iran has learned something from Russia about the strategy of misdirection via the government's recruitment of patriotic hackers...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

U.S. Admits to Cyber Attacks: The Future of Conflict

August 28, 2012 Added by:Pierluigi Paganini

“As a commander in Afghanistan in the year 2010, I was able to use my cyber operations against my adversary with great impact... I was able to get inside his nets, infect his command-and-control, and in fact defend myself against his almost constant incursions to get inside my wire, to affect my operations...”

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyberwar! Let’s Work Through This, Shall We...

August 28, 2012 Added by:Joel Harding

So what is cyberwar? Most people feel that some country is going to launch attacks against another, trying to blind their military, mute the government and make life incredibly miserable for their citizens. If the attack is successful, part of the economic base will probably be permanently destroyed...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Oil and Natural Gas Pipeline Intrusion Campaign

August 28, 2012 Added by:Infosec Island Admin

ICS-CERT onsite analysis included a search for host-based and network-based indicators to identify additional hosts for further analysis. ICS-CERT hashed files from approximately 1700 machines and compared them to hashes of known malicious files and examined proxy logs to identify any suspicious network activity...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

The Dutch and the Dorifel

August 27, 2012 Added by:Don Eijndhoven

XDocCrypt/Dorifel is a new trojan that encrypts executables, Excel- and Word files that it finds on USB drives and network disks, causing companies to come to a grinding halt after infection. What worries me most is it’s being delivered by systems previously infected with the Citadel/Zeus trojan...

Comments  (1)

296634767383f056e82787fcb3b94864

Lessons for CEOs from the Saudi Aramco Breach

August 27, 2012 Added by:Jeffrey Carr

Most security operations centers are monitoring for an APT-style attack and their defensive tactics are geared towards interrupting it by use of an "intrusion kill chain". The attack on Saudi Aramco didn't fit this model, and hence would have been completely missed by most of the world's largest companies...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Threat Intelligence: Plenty Out There, But Are You an Analyst?

August 27, 2012 Added by:Infosec Island Admin

As the complexity of attacks grow at a rate outstripping the pace of Moores Law, defenders have to take up a more nuanced approach to protecting their environments. Reliance on technical solutions alone is not tenable, you have to look at the creature behind the keyboard to get a better picture of the attack...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Throwing Stones in Glass Houses: Views on the Security Industry

August 26, 2012 Added by:Rafal Los

The Information Security industry is rife with negativity. Why are we so quick to pile on to others' pain? Isn the security community just more cynical by nature, is it psychological? Are we wired this way? As an industry, our goal is to create more resilient, more secure' and more defensible postures for everyone...

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks Increasingly Target Small Companies

August 26, 2012 Added by:Bill Gerneglia

Your company may not be the primary target, an attacker may use your organization as a stepping-stone to attack another. Don't be the weakest link in the supply chain. Information is power, the attackers know this, and successful attacks can result in significant financial loss...

Comments  (4)

Bd07d58f0d31d48d3764821d109bf165

Mobile Infrastructure: The Elephant in the Data Center

August 25, 2012 Added by:Tripwire Inc

One area that seems to be ignored is the infrastructure that supports increasingly cloud dependent mobile devices, possibly due to many not seeing server exploits and defenses as anything new. However, as the popularity of mobile devices push services such as the iCloud, exposure increases exponentially...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

False Flags, Geopolitics and Cyber Spies

August 22, 2012 Added by:Rafal Los

False flag is when an operation of some kind is carried out by one group but falsely attributed to another. Whether it's a rogue attacker attributing an attack to a rival group or a nation-state attempting to cause tensions between rival nations for their own benefit - the conspiracy theories write themselves...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Saudi Aramco: Are We ready for an Escalation of Cyber Attacks?

August 22, 2012 Added by:Pierluigi Paganini

Incidents like this are bound to increase, as attacks by political groups and governments are occurring with increasing frequency, and it is a miracle that so far there has been no loss of life. But in the near future, every company and agency will need to prepare for such events in order to avoid catastrophic consequences...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

Cyber Militias in the US: Feasibility, Structure, and Purpose

August 21, 2012 Added by:

Offensive cyber attacks benefit from their lack of structure and diversity of attack vectors. Cyber militias can be assigned a target and given the ability to choose their methods based on their capabilities. The absence of formal rules of engagement allows the cyber militia to exercise creativity and innovation...

Comments  (8)

03b2ceb73723f8b53cd533e4fba898ee

Shamoon Malware: Cyber Espionage Tool or Cyber Weapon

August 20, 2012 Added by:Pierluigi Paganini

Many hypotheses have been proposed, and some experts are convinced that Shamoon is a new state sponsored malware designed for cyber espionage that is also able to destroy the victims' device, perhaps to hide its operations by deleting evidence that can link the agents to the Command & Control servers...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Is Your IT Posture that of a Protector, a Detective, or a Warrior?

August 19, 2012 Added by:Richard Stiennon

The attackers are going to breach your network to get what they want. The question is: how fast can you discover an intrusion, figure out what the attacker is after, stop the attack, clean up – and prepare for their return? After all, motivated attackers will be back...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

How Will Israel Attack Iran?

August 18, 2012 Added by:Pierluigi Paganini

It is expected that in the first phase of an offensive against Iran, Israel will conduct a cyber attack of impressive dimensions with the intent to paralyze the country by knocking out the Internet, all communications and other critical infrastructure. This is the new way to engage in a war...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »