Cyber Espionage

Type: Keyphrase
Name: Cyber Espionage
First reported 8 hours ago - Updated 25 mins ago - 1 reports

Xi urges army to create strategy for info warfare

BEIJING:  Chinese President Xi Jinping has said China will spur military innovation and called on the army to create a new strategy for “information warfare” as the country embarks on military reform, state media said yesterday.Xi heads the Central Military ... [Published Qatar Peninsula - 8 hours ago]
First reported 2 hours ago - Updated 2 hours ago - 1 reports

China targeting satellite control technology

Chinese technology spies sought U.S. satellite control technology from U.S. defense contractors, according to a Pentagon report.The report by the Defense Security Service, “Targeting U.S. Technologies: A Trend Analysis of Cleared Industry Reporting,” ... [Published Flash Critic - 2 hours ago]
First reported 2 hours ago - Updated 2 hours ago - 1 reports

China tightens security after Snowden

The massive disclosure of National Security Agency documents has made it more difficult for U.S. electronic spies to spy on China — perhaps the most important strategic nation state intelligence target.China’s state-run Science and Technology Daily reported ... [Published Flash Critic - 2 hours ago]
First reported Aug 29 2014 - Updated Aug 29 2014 - 1 reports

Russian Hackers Breach JPMorgan Chase, Four Other U.S. Banks

The hackers stole gigabytes of sensitive data, though it's not clear whether the attacks were aimed at financial gain or cyber espionage. ... [Published eSecurityPlanet - Aug 29 2014]
First reported Aug 28 2014 - Updated Aug 28 2014 - 1 reports

NetTraveler Gets A Makeover For 10th ...

Kaspersky Lab has observed a rise in attacks with an updated version of the “red star” APT backdoor. In 2014 the actors behind global cyberespionage campaign “Operation NetTraveler” celebrate ten years of activity. Although the earliest samples appeared ... [Published EFYTimes.com - Aug 28 2014]
First reported Aug 28 2014 - Updated Aug 28 2014 - 1 reports

FBI, Secret Service hunting hackers targeting banks, customers

A recent string of cyberattacks targeting U.S. financial institutions is now being investigated by the FBI and Secret Service. Foreign hackers continually attack western banks and corporations, with JPMorgan Chase and at least four unnamed banks targeted ... [Published TweakTown - Aug 28 2014]
First reported Aug 27 2014 - Updated Aug 27 2014 - 2 reports

China’s Cyber Attacks Tied to U.S. Companies, Contractors and Gov’t Systems

by Hanqing Chen ProPublica, Aug. 27, 2014, 7 a.m.U.S.-China tensions have risen recently over suspicions of Chinese nationals infiltrating U.S. company computer systems. In late May, the U.S. Justice Department accused five Chinese military officers  of ... [Published Value Walk - Aug 27 2014]
First reported Aug 27 2014 - Updated Aug 27 2014 - 1 reports

4th Latin American Security Analysts Summit in Cartagena

Casco Historico, Cartagena, Colombia Last week, GReAT LatAm had the pleasure of participating in the Fourth Latin American Security Analysts Summit in Cartagena, Colombia. We were joined by 29 journalists from 12 different countries throughout ... [Published Kaspersky Lab - Aug 27 2014]
First reported Aug 27 2014 - Updated Aug 27 2014 - 1 reports

Updated NetTraveler Backdoor Has Encrypted Configuration File

A new spear-phishing campaign has been detected to deliver a fresh version of NetTraveler malware, which features an encrypted configuration file.The malware, also known as “Travnet” and “Netfile,” has been active for as long as ten years, as researchers ... [Published Softpedia - Aug 27 2014]
First reported Aug 26 2014 - Updated Aug 26 2014 - 1 reports

First things first: secure the core

The indictment of foreign generals by a U.S. grand jury highlights the scale and severity of cyber-espionage and attacks on critical industrial and governmental entities.A link to this page will be included in your message. ... [Published Federal Times - Aug 26 2014]
First reported Aug 25 2014 - Updated Aug 26 2014 - 1 reports

China to change its National Security Law with extra powers

China is all set to beef up its National Security Law by granting sweeping powers to security agencies backed by stiff punishments for counterespionage in the backdrop of reports of cyber-snooping by the US.A new bill submitted at the Standing Committee ... [Published Business Standard India - Aug 25 2014]
First reported Aug 25 2014 - Updated Aug 25 2014 - 1 reports

Editor’s Note: Protect This House

In the digital manufacturing era, it’s time for manufacturers to step up on intellectual property protection with stout, proactive defense. And it’s not just China that companies should be keeping their eyes on in the handling of proprietary data.IP theft ... [Published ThomasNet - Aug 25 2014]

Quotes

"We are working with the United States Secret Service to determine the scope of recently reported cyberattacks against several American financial institutions" said Joshua Campbell, FBI spokesperson, in a statement
...Win32.Agent.lifr ), which in turn installs a number of other files. The main C&C module is dumped into " %SystemRoot%\system32\Windowsupdataney.dll ", (detected by Kaspersky as Trojan-Spy.Win32.TravNet.qfr ). "
...Founder Thomas Watson famously said: "All the world's problems could easily be solved if people were only willing to think." Well now in the modern tech industry it is IBM which has to think and evolve to maintain its position in the computing world
"We've seen organizations approach the framework in different ways," said Adam Sedgewick, senior policy analyst for NIST, in a statement . "Some are using it to start conversations within their organizations or across their sectors, others to create detailed cyber-risk management plans. We want to hear from all stakeholders to understand how they've used the framework, how it's been helpful, and where challenges may lie."

More Content

All (1344) | News (664) | Reports (0) | Blogs (669) | Audio/Video (10) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
China tightens security after Snowden [Published Flash Critic - 2 hours ago]
China targeting satellite control technology [Published Flash Critic - 2 hours ago]
Xi urges army to create strategy for info warfare [Published Qatar Peninsula - 8 hours ago]
Oil and energy industry in Norway is under attack [Published Security Affairs - 16 hours ago]
North Korea cyber warfare programme detailed by... [Published ITProPortal.com - Aug 29 2014]
Russian Hackers Breach JPMorgan Chase, Four Oth... [Published eSecurityPlanet - Aug 29 2014]
Microsoft to close Windows Live Messenger servi... [Published Financial Express - Aug 29 2014]
The Cyber Threat: Just a click away [Published Metals Service Center Institute - Aug 29 2014]
NetTraveler Gets A Makeover For 10th ... [Published EFYTimes.com - Aug 28 2014]
FBI, Secret Service hunting hackers targeting b... [Published TweakTown - Aug 28 2014]
How immune are you to cyber threats? [Published E27 - Aug 28 2014]
JP Morgan Chase Impacted by Cyber Attack Target... [Published Softpedia - Aug 28 2014]
ABA annual meeting recap: latest developments i... [Published Lexology - Aug 27 2014]
China’s Cyber Attacks Tied to U.S. Companies, C... [Published Value Walk - Aug 27 2014]
US Investors Eye IPO For China's Alibaba [Published VOA News - Aug 27 2014]
4th Latin American Security Analysts Summit in ... [Published Kaspersky Lab - Aug 27 2014]
TakeDownCon 2014 - How Networks are Getting Hac... [Published SecurityTube.Net - Aug 27 2014]
Updated NetTraveler Backdoor Has Encrypted Conf... [Published Softpedia - Aug 27 2014]
China’s Cyber Attacks Tied to U.S. Companies, C... [Published ProPublica: Articles and Investigations - Aug 27 2014]
NetTraveler APT Gets a Makeover for 10th Birthday [Published Kaspersky Lab - Aug 27 2014]
IBM: The Good, The Bad And The Ugly [Published Seeking Alpha - Aug 26 2014]
Snowden affair put focus on Microsoft [Published Shanghai Daily - Aug 26 2014]
First things first: secure the core [Published Federal Times - Aug 26 2014]
Behind the huge cyberattack campaign in Latin A... [Published Quartz - Aug 26 2014]
Innovations: Would you run a super-powerful, su... [Published Washington Post - Aug 26 2014]
NIST Seeks User Feedback for Cybersecurity Fram... [Published Infosecurity - Latest News - Aug 26 2014]
CME Halt Electronic Gold and Silver Futures Tra... [Published Zero Hedge - Aug 26 2014]
CME Halt Electronic Gold and Silver Futures Tra... [Published Zero Hedge - Aug 26 2014]
Plain English reboot for government cyber secur... [Published GovernmentNews.com.au - Aug 26 2014]
iSIGHT Partners Releases 1H 2014 Activities [Published Individual.com - Aug 26 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Oil and energy industry in Norway is under attack [Published Security Affairs - 16 hours ago]
According to a government agencies around 300 oil and energy companies in Norway have been targeted by one of the biggest hacking campaign. Nearly 300 oil and energy companies in Norway have been targeted by one of the biggest cyber attacks ever to ...
Russian Hackers Breach JPMorgan Chase, Four Oth... [Published eSecurityPlanet - Aug 29 2014]
The hackers stole gigabytes of sensitive data, though it's not clear whether the attacks were aimed at financial gain or cyber espionage. ...
4th Latin American Security Analysts Summit in ... [Published Kaspersky Lab - Aug 27 2014]
Casco Historico, Cartagena, Colombia Last week, GReAT LatAm had the pleasure of participating in the Fourth Latin American Security Analysts Summit in Cartagena, Colombia. We were joined by 29 journalists from 12 different countries throughout ...
TakeDownCon 2014 - How Networks are Getting Hac... [Published SecurityTube.Net - Aug 27 2014]
This presentation will cover how network and internet security is evolving. No matter how big your organization is, the possibility of having your network hacked is now higher than ever. This presentation will discuss how the attack landscape is changing ...
NetTraveler APT Gets a Makeover for 10th Birthday [Published Kaspersky Lab - Aug 27 2014]
We have written about NetTraveler before HERE and HERE . Earlier this year, we observed an uptick in the number of attacks against Uyghur and Tibetan supporters using an updated version of the NetTraveler backdoor. Here's an example of a targeted ...
1 2 3 4 5 6 7 8 9 10 ...

Audio/Video

sort by: Date | Relevance
China's Cyberspying [Published Wall Street Journal What's News - May 30 2014]
China denounces U.S. cyber espionage charges [Published Reuters Video: Top News - May 20 2014]
Deal making frenzy grips Wall Street [Published Reuters Video: Top News - May 20 2014]
Deal making frenzy grips Wall Street [Published Reuters Video: Business - May 20 2014]
Deal making frenzy grips Wall Street [Published Reuters Video: Top News - May 19 2014]
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.