7 August 2014
Background Check Firm Hit by Breach
Category Archives: Persistent Threats
Chinese Hackers Extending Reach to Smaller U.S. Agencies, Officials Say- 15 July 2014
15 July 2014- New York Times
Chinese Hackers Extending Reach to Smaller U.S. Agencies, Officials Say
Canada Says China Hacked Science Agency Computers- 30 July 2014
30 July 2014- SecurityWeek
Canada Says China Hacked Science Agency Computers
Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System- 28 July 2014
28 July 2014- Krebs on Security
Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System
Dragonfly: Western Energy Companies Under Sabotage Threat- 30 June 2014
30 June 2014- Symantec
Dragonfly: Western Energy Companies Under Sabotage Threat
Cyber Attacks Analyzed by Mikko Hypponen- 10 July 2014
10 July 2014 MIT Technology Review
Cyber Attacks analysed by Mikko Hypponen
North Korea “Doubles Cyber War Personnel- 6 July 2014
6 July 2014- Channel NewsAsia
“N Korea “doubles cyber war personnel””
2014: The Year Extortion Went Mainstream- 14 June 2014
14 June 2014- Krebs on Security
Chinese Cyber Espionage: We Know the Who, How, Why, and Why it Matters–We’re Missing the What to Do- 11 June 2014
11 June 2014- Council on Foreign Relations
“Chinese Cyber Espionage: We Know the Who, How, Why, and Why it Matters–We’re Missing the What to Do”
Crowdstrike Report on “Putter Panda”, PLA Unit 61486- 9 June 2014
9 June 2014- Crowdstrike
Crowdstrike Report on “Putter Panda”, PLA unit 61486
5 in China Army Face U.S. Charges of Cyberattacks – May 19, 2014
5/19/2014 – New York Times
5 in China Army Face U.S. Charges of Cyberattacks
Iranian Hackers Targeted Defense Workers and Political Dissidents- 13 May 2014
13 May 2014- Recode
Iranian Hackers Targeted Defense Workers and Political Dissidents
Iranian Hackers Target US Defense Contractors- 13 May 2014
13 May 2014- Threat Post
Iranian Hackers Target US Defense Contractors
“Operation Clandestine Fox” Now Attacking Windows XP Using Recently Discovered IE Vulnerability- 1 May 2014
Tracking the Clandestine Fox- 29 April 2014
29 April 2014- Recorded Future
Tracking the Clandestine Fox
U.S. Promotes Network to Foil Digital Spying- 20 April 2014
20 April 2014
U.S. Promotes Network to Foil Digital Spying
Unflod Baby Panda, the Chinese Malware Hit Jailbroken iPhone – April 19, 2014
4/19/2014 – Security Affairs
Unflod Baby Panda, the Chinese malware hit jailbroken iPhone
Crimeware or APT? Malware’s “Fifty Shades of Grey” – April 15, 2014
4/15/2014 – FireEye
Crimeware or APT? Malware’s “Fifty Shades of Grey”
Obama lets NSA use zero-day flaws given “clear national security” need- 13 April 2014
13 April 2014- Ars Technica
Obama lets NSA use zero-day flaws given “clear national security” need
White House cyber chief: future cyber attack to wipe out critical infrastructure- 29 March 2014
29 March 2014- Flashcritic
White House cyber chief: future cyber attack to wipe out critical infrastructure
