Syrian Hackers Wage Misinformation War
It’s unnerving to see the anomaly dominating the picture at right (and the real world market value loss) and find out it was the result of a single bad tweet. But that’s exactly what happened earlier...
View ArticleSEA and Anonymous, Allies by Convenience in Attacks on Turkey
Click for interactive view War sometimes makes strange bedfellows, and the cyber battlefield is proving to be no different. Two prominent hacker collectives (or government organizations depending on...
View ArticleSyrian Electronic Army inspired by previous Anonymous hack of Melbourne IT?
Reposted from Social Media Threat. Earlier this week, the New York Times, Twitter, and the Huffington Post UK experienced disruptions to their websites that included visitors being redirected to sites...
View ArticleSyrian Electronic Army Attacks Linked to Political Statements on Syria
Originally published on October 9, 2013 by Mashable in an article entitled Syrian Electronic Army Attacks Linked to Obama’s Mentions of Syria. From Mashable: The frequency of attacks that the infamous...
View ArticleSyrian Electronic Army Continues to Adapt, Targeting Communications Partners
Last weekend, the Syrian Electronic Army again grabbed headlines with a high-profile attack on BarackObama.com. An aspect that caught our attention is how the SEA continues to adapt their methods by...
View ArticleMeasuring the Media Impact of Hacktivists
How can we measure the success of hacktivists? Certainly, achievement of a desired political change is the choice outcome. But seeking a non-zero metric, let’s consider the amount of media coverage an...
View ArticleWhich Hacker Groups Give Warning of Cyber Attacks?
We’ve previously considered media impact as a success criterion for hackers. This led us to report the most media-savvy hacktivists. In their respective ways, groups like the Syrian Electronic Army,...
View Article‘Islamic Cyber Resistance’ Breaks Iranian Hacker Silence, Exposes Links to SEA
The freeze on Iranian hacktivist activity during nuclear negotiations was broken last week although it doesn’t appear to be government sponsored. The Islamic Cyber Resistance (ICR), not yet discussed...
View ArticleSyrian Electronic Army Phishing in Turkey, Turkish Hackers Retaliate
The Syrian Electronic Army was busy playing both offense and defense last week. They reportedly gained access to multiple Microsoft assets including social media channels and the Official Microsoft...
View ArticleHow Al-Qaeda Uses Encryption Post-Snowden (Part 1)
Analysis Summary Since 2007, Al-Qaeda’s use of encryption technology has been based on the Mujahideen Secrets platform which has developed to include support for mobile, instant messaging, and Macs....
View ArticleCombating Child Sex Trafficking Through Web Intelligence
Child sex trafficking is one of the most horrific crimes on planet Earth. According to victims’ advocates, most human trafficking is undetected and unreported. Exceptional crimes like the recent Boko...
View ArticleWill Egypt’s Presidential Election Bring More Unrest?
On May 26 and 27, Egypt will hold its second presidential election in two years. In 2012, Muslim Brotherhood candidate Mohammed Morsi was elected president. This year, the man responsible for deposing...
View ArticleHow Governments Can Use Web Intelligence for Insights
The following interview is with Simon Thacker and is from our Web Intelligence Perspectives Series. Simon is head of strategic early warning for the UK Cabinet Office. What is it about web intelligence...
View ArticleWorking With ThreatConnect to Give Cyber Attacks Context
Recorded Future recently partnered with our friends at ThreatConnect to provide geopolitical context to their excellent analysis on cyber espionage in the South China Sea. We love this quote by the...
View Article4 Ways to Stop APT Attacks Using Web Intelligence
In case you missed it, below is a brief recap of our webinar yesterday with Oren Falkowitz. Oren began with a baseline, observing most efforts to combat APTs (Advanced Persistent Threats) focus on...
View ArticleDan Geer on Web Intelligence and Cyber Security
The following interview is with Dan Geer and is from our Web Intelligence Perspectives Series. Dan is currently the chief information security officer for In-Q-Tel. What is it about web intelligence...
View ArticleShedding Light on STTEAM
Researchers from Fidelis Security in February reported a newly identified cyber campaign dubbed STTEAM (PDF) found to be targeting oil and gas companies in the Middle East. The Fidelis team provided...
View ArticleUnderstanding Moroccan Politics With Open Source Intelligence
Analysis Summary Open source intelligence indicates political tensions surrounding the Moroccan Justice and Development Party steadily increased between 2012 and 2013. Open source intelligence also...
View ArticleIranian Hacker Network Linked to Familiar Group?
News of an Iranian hacker network targeting US government officials made waves yesterday after being uncovered by iSIGHT Partners. Buried deep in Reuters’ report is a password used by the group:...
View ArticleCyber Threat Landscape: Basic Overview and Attack Methods
This is the first post in our blog series that aims to provide a basic overview of the contemporary cyber threat landscape. The flourishing synergy between the internet and its beneficiaries, who use...
View Article
More Pages to Explore .....