Duqu

Type: Keyphrase
Name: Duqu
First reported Sep 15 2014 - Updated Sep 15 2014 - 3 reports

Dragonfly malware targeting pharmaceutical companies

The recently revealed Dragonfly (Havex) malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed, according to Belden.Until now, advanced cyberattacks against industry have focused on the critical energy and ... [Published Net Security - Sep 15 2014]
First reported Sep 05 2014 - Updated Sep 05 2014 - 1 reports

Are You Protecting What’s Irreplaceable?

F-Secure (NASDAQ: OMX Helsinki Ltd.) is a global security leader protecting its customers' irreplaceable digital content and online interactions. Headquartered in Finland, the company has a current market cap of 433.53 million Euros.If you think that ... [Published Silicon India - Sep 05 2014]
First reported Aug 18 2014 - Updated Aug 18 2014 - 1 reports

Hackers Inside Chinese Military Steal U.S. Corporate Trade Secrets

In May, a grand jury in the Western District of Pennsylvaniaindicted five members of the Chinese military on charges ofhacking and economic espionage, according to a May 19 U.S.Department of Justice media release. Per the same release, thetargets were ... [Published Network World Asia - Aug 18 2014]
First reported Aug 15 2014 - Updated Aug 15 2014 - 1 reports

Snowden: NSA working on 'MonsterMind' cyberwar bot

Edward Snowden has described to Wired the final straw that broke the camel's back and turned him into a whistleblower: an NSA project called MonsterMind that would give the agency control of all internet traffic entering the US, the ability to detect ... [Published Sophos Anti Virus - Aug 15 2014]
First reported Aug 04 2014 - Updated Aug 04 2014 - 1 reports

Analysis of the Stuxnet Cyber Weapon Family and Dragonfly

Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of national security to develop advanced mitigation techniques and capabilities. The progenitor of Duqu , Flame and Gauss are ... [Published Security Affairs - Aug 04 2014]
First reported Jul 02 2014 - Updated Jul 02 2014 - 1 reports

Operation Dragonfly Imperils Industrial Protocol

Recent headlines ( here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, ... [Published McAfee Blogs - Jul 02 2014]
First reported May 13 2014 - Updated May 13 2014 - 1 reports

Cyber Security: A Few Troubling Questions

Rajabahadur V. ArcotWhile information and communication technology continues to contribute in connecting the world and shaping our lives in ways never thought of before, its downside is beginning to cast dark shadows. Hackers and cyber criminals are not ... [Published Industry 2.0 - May 13 2014]

Quotes

"We know now that Stuxnet and Flame remained hidden in their target networks for years - by the time worms like these do damage or steal trade secrets, it is too late to defend against them.:"
..." [2] And Gabi Siboni, Senior Research Fellow at Tal Aviv University’s Institute for National Security Studies, has stated that "Iran should be considered a first-tier cyber power.” [3]"

More Content

All (24) | News (16) | Reports (0) | Blogs (8) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Dragonfly malware targeting pharmaceutical comp... [Published Net Security - Sep 15 2014]
How Dragonfly Hackers and RAT Malware Threaten ... [Published Noodls - Sep 15 2014]
Belden Research Reveals Dragonfly Malware Likel... [Published Town Hall - Sep 15 2014]
Are You Protecting What’s Irreplaceable? [Published Silicon India - Sep 05 2014]
Hackers Inside Chinese Military Steal U.S. Corp... [Published Network World Asia - Aug 18 2014]
Snowden: NSA working on 'MonsterMind' cyberwar bot [Published Sophos Anti Virus - Aug 15 2014]
Analysis of the Stuxnet Cyber Weapon Family and... [Published Security Affairs - Aug 04 2014]
Operation Dragonfly Imperils Industrial Protocol [Published McAfee Blogs - Jul 02 2014]
Cyber Security: A Few Troubling Questions [Published Industry 2.0 - May 13 2014]
HP Security Research Threat Intelligence Briefi... [Published HP Security Research Blog - Feb 21 2014]
New global cyber-espionage operation uncovered [Published telecomasia.net - Feb 17 2014]
Possible state-sponsored cyber attack deemed el... [Published Fierce Government IT - Feb 14 2014]
The Mask Hack "Beyond Anything We've Seen So Far" [Published PCMag.com Security Coverage [Feed] - Feb 11 2014]
Uncovering ‘The Mask’, the most sophisticated m... [Published SiliconANGLE - Feb 11 2014]
The Most Sophisticated Malware Might Hit You Soon! [Published EFYTimes.com - Feb 11 2014]
Details Emerge on Latest Adobe Flash Zero-Day E... [Published threatpost - The First Stop for Security News - Feb 05 2014]
Emergency Adobe Update Patches Flash Zero-Day [Published threatpost - The First Stop for Security News - Feb 04 2014]
Kaspersky Lab Investigating 'Extremely Sophisti... [Published SecurityWeek RSS Feed - Feb 03 2014]
Blog: Destructive Malware - Five Wipers in the ... [Published Securelist - Dec 18 2013]
US Cyber Command’s Plan X: Pentagon Launching C... [Published RINF.com - Oct 03 2013]
Industrial control ‘honeypots’ show systems are... [Published GCN - Aug 07 2013]
Security experts analyzing Flame malware [Published Topnews.in - May 31 2012]
Iran admits nuke facilities targeted by ‘Duqu’ ... [Published Topnews.in - Nov 15 2011]
Iran claims detecting virus aimed at nuclear es... [Published Topnews.in - Nov 15 2011]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Analysis of the Stuxnet Cyber Weapon Family and... [Published Security Affairs - Aug 04 2014]
Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of national security to develop advanced mitigation techniques and capabilities. The progenitor of Duqu , Flame and Gauss are ...
Operation Dragonfly Imperils Industrial Protocol [Published McAfee Blogs - Jul 02 2014]
Recent headlines ( here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, ...
HP Security Research Threat Intelligence Briefi... [Published HP Security Research Blog - Feb 21 2014]
Iranian hacker groups and their allies launched increasing numbers of cyber attacks over the last year, despite strict state controls of Internet traffic including: spying, censorship, and filtering laws and technology.  HPSR has observed an increasing ...
The Mask Hack "Beyond Anything We've Seen So Far" [Published PCMag.com Security Coverage [Feed] - Feb 11 2014]
Stuxnet? Duqu? Flame? You ain't seen nothing yet. Kaspersky describes just-discovered threat "The Mask" as "beyond anything else we've seen so far." ...
Uncovering ‘The Mask’, the most sophisticated m... [Published SiliconANGLE - Feb 11 2014]
An incredibly complex malware that’s said to be one of the most sophisticated ever discovered has been targeting computers around the world since at least 2007, according to a new report from security firm Kaspersky Labs . The malware, which has ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.