Read more about cyber espionage
Bookmark and Share
  • Pawn Storm cyberspies still at work, target NATO and the White House


    Pawn Storm, the long-standing economic and political cyber-espionage operation that has been first detailed in October 2014, continues unabated.

  • New trend in cybercriminal activity: APT wars


    Kaspersky Lab has recorded a rare and unusual example of one cybercriminal attacking another.

  • US to enact sanctions against foreign cyber attackers


    US president Barack Obama has signed on Wednesday a new executive order aimed at imposing "sanctions on individuals or entities that engage in malicious cyber-enabled activities that create a significant threat to the national security, foreign policy, or economic health or financial stability of the United States." "The malicious cyber-enabled activity must have the purpose or effect of significantly harming or compromising critical infrastructure; misappropriating funds or economic resources, trade secrets, personal identifiers, or financial information for commercial or competitive advantage or private financial gain; knowingly receiving or using trade secrets that were stolen by cyber-enabled means for commercial or competitive advantage or private financial gain; disrupting the availability of a computer or network of computers (for example, through a denial of service attack); and attempting, assisting or providing material support for any of the above activities," the president explained.

  • How security pros deal with cybercrime extortion


    1 in 3 security professionals recommend negotiating with cybercriminals for the return of stolen data or the restoration of encrypted files, according to ThreatTrack Security.

  • State-sponsored hackers target European, Israeli organizations


    Rocket Kitten, the APT group of attackers that have been delivering spear-phishing emails with the Ghole malware to Israeli and European institutions late last year, have lately been spotted mounting a new operation.


Pen-testing drone searches for unsecured devices

You're sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer buzzes to life and, after spitting out your print job, it continues to work and presents you with more filled pages than you expected.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Oct 9th