article thumbnail

NON-STATE ACTORS IN THE CYBERSPACE: AN ATTEMPT TO A TAXONOMIC CLASSIFICATION, ROLE, IMPACT AND RELATIONS WITH A STATE’S SOCIOECONOMIC STRUCTURE

Security Affairs

This paper provides a taxonomic classification of non-state actors in the cyberspace, analyzing their role and impact on a state’s socioeconomic structure. Looking back at 2007, Estonia fell victim to a powerful cyber-attack that shut down government services, telecommunications, and banks in the country. Pierluigi Paganini.

Paper 320
article thumbnail

CM Summit White Paper from 2007

John Battelle's Searchblog

It’s interesting to see the topics in the white paper come to life, including chestnuts like “Conversation Over Dictation,” “Platform Over Distribution,” “Engagement Over Consumption,” and “Iteration and Speed Over Perfection and Deliberation.” ” Enjoy.

Paper 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Winnti APT Group targeted Hong Kong Universities

Security Affairs

” The Winnti group was first spotted by Kaspersky in 2013, but according to the researchers the gang has been active since 2007. “In contrast, the variants we described in our white paper didn’t even have that module embedded.” ” continues the report.

Paper 239
article thumbnail

LightNeuron, a Turla’s backdoor used to compromise exchange mail servers

Security Affairs

Turla group (also known as Waterbug, Venomous Bear and KRYPTON) has been active since at least 2007 targeting government organizations and private businesses. ESET shared a full list of Indicators of Compromise (IoCs) and samples in a white paper and on GitHub. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Paper 257
article thumbnail

Winnti Group was planning a devastating supply-chain attack against Asian manufacturer

Security Affairs

The Winnti group was first spotted by Kaspersky in 2013, according to the researchers the gang has been active since 2007. ” reads the paper published by ESET. Researchers also discovered that the APT group used an updated version of its ShadowPad malware. We believe its author call it PortReuse.”

article thumbnail

Operation In(ter)reception targets Military and Aerospace employees in Europe and the Middle East

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

Military 295
article thumbnail

An Untrustworthy TLS Certificate in Browsers

Schneier on Security

Vostrom filed papers in 2007 to do business as Packet Forensics, according to Virginia state records. They estimated that those apps were downloaded more than 60 million times, including 10 million downloads of Muslim prayer apps. Measurement Systems was registered in Virginia by Saulino, according to another state filing.

Paper 132