Operation Aurora : A Deep Dive into the 2010 State-Sponsored Cyber Attack
Operation Aurora: a modern CTI deep dive into the 2009–2010 intrusion setOperational CTI, incident response, nation-state tradecraft, CVE-2010-0249, Internet Explorer, Hydraq, Elderwood, IP theft, source code compromise, spearphishing, watering hole…
Unveiling Stuxnet: The pioneering cyber-physical sabotage of Siemens Step7
Stuxnet, first discovered in 2010, was a malicious computer worm that caused substantial damage to Iran's nuclear program. The worm targeted supervisory control and data acquisition (SCADA) systems. It is…
The 2014 eBay Data Breach: An In-depth Look
The eBay cyberattack in May 2014 stands as one of the most substantial cybersecurity incidents of the year. The breach compromised a database containing encrypted passwords and other non-financial data.…
2014 JP Morgan Chase breach
In 2014, JPMorgan Chase, one of the world’s leading financial institutions, suffered one of the most significant data breaches in history. The attackers compromised data from 76 million households and…
The 2013-2014 Target Data Breach
Although the initial breach occurred in late 2013, the impact and implications of the Target data breach were felt well into 2014 and beyond. The breach saw the theft of…
