skip to Main Content

In Evidence

Cybercrime spread malware via fake websites of popular software
Doctor Web cyber security experts: A copy of the NordVPN official website hosts the dangerous banking trojan, Win32.Bolik.2. Early this year the same group did the same with VSDC.
Iraq, wave of arrests in third phase of Operation Victory Will against Isis
The Islamic State militiamen lose several key figures between Diyala and Nineveh. They try to react with waves of attacks, but in vain. Meanwhile, ISF increase the pressure on Daesh.
Hactivism as fashion has ended, it’s returning to origins
Insikt Group cyber security experts: The number of large-scale, international hacking operations most commonly associated with hacktivism, fall dramatically after 2016. Here’s why.
Syria, Isis opens Wilayat al-Sham west of the Euphrates
Damascus has always underestimated the Daesh pockets resistance in the Badia al-Sham desert and now risks paying the consequences. Furthermore, the SAA is engaged in Hama and Idlib.
Fortnite gamers are under attack by Syrk ransomware
Cyren cyber security experts: The malware is disguised as a game hack. Cybercrime threatens to delete batches of files every two hours, if the user don’t pay. But there are a couple of solutions.
Syria, maxi SDF blitz against the ISIS assassination cell in Raqqa
Jazeera Storm's HATs dismantle the Islamic State fire group, which was preparing new attacks. Anti-Daesh maneuvers also in Tabqa and Hasakah. Meanwhile, reconstruction continues.
Cloud Atlas updated its attack arsenal with new tools to avoid detection
Kaspersky cyber security experts: The cyber espionage APT postpones the execution of PowerShower until a later stage to make the malware invisible.
Syria, post-ISIS reconstruction began in the east while north is on chaos
Works in Raqqa (restoration of the Church of the Martyrs), Deir Ezzor and Hasakah, while the SDF hunt the Islamic State. In Idlib the SAA conquers Khan Sheikhoun, but the crisis helps Daesh.
Cybercrime, there is a new version of GoBrut botnet in the wild
Yoroi-Cybaze ZLab cyber security experts: It’s compiled for Linux. The malware is targeting hundred of thousand WordPress powered websites, and part of them are related to Italy.
Syria, the SDF at Deir Ezzor dismantle another ISIS cell in Busayrah
Jazeera Storm is on the hunt for the Islamic State groups, who have been turned into guerrillas, and carry out attacks in the region. The last two occurred in Shaddadi and Qamishlo.
Defense and Security goes on vacation for a week
Transmissions will be interrupted from August 12th to 19th, subjects to exceptions. We will return soon with the usual news, insights and curiosities.
Varenyky, a new spambot for sextortion scam campaigns in France
ESET cyber security experts: The malware targets people when they are using sites related to sex, pornography, and known pornographic sites. It excludes not French and it’s evolving.
Iraq, the third phase of Operation Victory Will against Isis starts
The maneuvers, which began three days ago, target the Islamic State militiamen in Diyala and Nineveh. The goal, in addition to the Daesh cells, are the tunnels and the facilitators.
North Korea stole US$ 2bn with cyber attacks to fund It’s weapons program
It has been unveiled by a leaked United Nations report. Pyongyang state sponsored hackers as Lazarus preferred cryptocurrency to avoid international controls on money flux.
Syria, SDF and Coalition attack Isis oil smugglers at Deir Ezzor
Jazeera Storm and Inherent Resolve target the Daesh network that passes in Shahil. At the same time they work, also with the Sand Hippos, to find the other routes of the Islamic State.
Cyber Espionage, APT28 leaverages IoT to access corporate networks
Microsoft cyber security experts: The Russian group aka Fancy Bear, Pawn Storm, Sofacy Group, STRONTIUM, and Sednit) tried to compromise devices to gain initial access.
Iraq-Syria, SDF and ISF increase the pressing on Isis
Ongoing maneuvers against Islamic State cells in Hasakah, Deir Ezzor, Nineveh and Diyala. Inherent Resolve provides air support and bombs Daesh posts.
Cyber Espionage, Machete operators target Venezuela military
ESET cyber security experts: There are also attacks on Ecuador, Colombia and Nicaragua. The malware operators use spear phishing campaigns with real old documents as a lure.

Since August 28th 2018 all our Newsletters are active. Subscribe! Every Saturday you will receive a weekly report of everything we have published.

Defence

Defense and Security goes on vacation for a week
Transmissions will be interrupted from August 12th to 19th, subjects to exceptions. We will return soon with the usual news, insights and curiosities.

Cyber

Defense and Security goes on vacation for a week
Transmissions will be interrupted from August 12th to 19th, subjects to exceptions. We will return soon with the usual news, insights and curiosities.
Back To Top