#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

Cyber warfare | Breaking Cybersecurity News | The Hacker News

Category — Cyber warfare
PandaLabs Predicts Major Cybersecurity Trends for 2011

PandaLabs Predicts Major Cybersecurity Trends for 2011

Dec 23, 2010
PandaLabs, the antimalware laboratory of Panda Security, has predicted several major cybersecurity threats for 2011. These include hacktivism, cyber warfare, profit-driven malware, social engineering, and adaptive malicious codes. Additionally, there will be increased threats to Mac users, new attacks on 64-bit systems, and more zero-day exploits. Here is a summary of PandaLabs' top ten security trends for 2011: Malware Creation : In 2010, PandaLabs observed significant growth in malware, identifying 20 million new strains, more than in 2009. Currently, Panda's Collective Intelligence database contains over 60 million classified threats. Although the year-on-year growth rate has peaked, it was 50% in 2010, down from over 100% in previous years. Cyber Warfare : Incidents like Stuxnet and the WikiLeaks cables, which suggested Chinese government involvement in cyber-attacks on Google, marked a turning point in cyber conflicts. Stuxnet targeted uranium centrifuges in nuclear pl...
U.S. Faces Shortage of Computer Science Graduates Amid Rising Cybersecurity Needs

U.S. Faces Shortage of Computer Science Graduates Amid Rising Cybersecurity Needs

Dec 14, 2010
The United States could soon face a significant shortage of computer science professionals unless it starts graduating more students in this field. At a time when computer hacking and security are critical issues for both the government and the private sector, the U.S. is producing only 9,000 computer science graduates annually. Among them, only 700 specialize in computer and information systems security. This number is far from sufficient, especially when considering that a single defense contractor, Booz Allen Hamilton, alone needs 1,000 computer security specialists. Meanwhile, the military is dealing with the rapid rise of cyber warfare. It is becoming increasingly clear that while a traditional military attack on the United States is unlikely, the nation's economic system could be vulnerable to a cyber attack. Conversely, the U.S. can leverage its cyber capabilities to attack other countries. For instance, in September, Iran's nuclear program was disrupted by a computer...
CBI Website Hacked by Pakistani Cyber Army

CBI Website Hacked by Pakistani Cyber Army

Dec 04, 2010
In a major embarrassment, the website of India's premier investigating agency, the Central Bureau of Investigation (CBI), was hacked tonight by a group identifying themselves as the "Pakistani Cyber Army." The CBI homepage displayed a message from the Pakistani Cyber Army, warning the Indian Cyber Army not to attack their websites. The hackers have exposed a significant vulnerability in India's cybersecurity by infiltrating one of the most secure websites. The CBI is linked to the command center of the world police organization, Interpol, 24/7. The hackers' message also criticized the National Informatics Centre (NIC), responsible for managing computer servers across India, and their filtering controls. Intelligence agencies have repeatedly warned the government that proper cybersecurity measures are lacking in government offices, and that no security audits are being conducted. The Pakistani Cyber Army further threatened to conduct "mass defacement"...
cyber security

Free Tool: Help Desk Verification Codes

websitePush SecurityThreat Detection / Identity Security
Get secure, rotating codes in employee browsers to verify their identity and stop Scattered Spider breaches.
BaitTrap: Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally

BaitTrap: Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally

Jul 08, 2025Financial Scams / Online Security
A newly released report by cybersecurity firm CTM360 reveals a large-scale scam operation utilizing fake news websites—known as Baiting News Sites (BNS)—to deceive users into online investment fraud across 50 countries. These BNS pages are made to look like real news outlets: CNN, BBC, CNBC, or regional media. They publish fake stories that feature public figures, central banks, or financial brands, all claiming to back new ways to earn passive income. The goal? Build trust quickly and steer readers toward professional-looking scam platforms like Trap10, Solara Vynex, or Eclipse Earn. Scammers use sponsored ads on Google, Meta, and blog networks to push traffic to these sites. Ads often carry clickbait headlines—"You won't believe what a prominent public figure just revealed"—paired with official photos or national flags to make them feel legit. Clicking the ad directs users to a fake article, which then redirects them to a fraudulent trading platform. Many of these scams follow a...
Panda Security Partners with Brazilian Army to Combat Cyberterrorism

Panda Security Partners with Brazilian Army to Combat Cyberterrorism

Nov 01, 2010
In an effort to combat cyberterrorism in Brazil, Panda Security has signed an agreement to support the training of the Brazilian Army's operational agents. These agents are engaged in the battle against internet-based crime and strategic intervention for cyber warfare. Panda Security will also provide endpoint protection for 37,500 computers belonging to the Army's Military Commands. This protection aims to counter malware, targeted attacks, and web threats. Panda's anti-malware lab, PandaLabs, will collaborate with the Army's Cyber-Warfare Communication Center to train individuals involved in the scientific and forensic investigation of cybercrime. The partnership will include the exchange of malware samples, with Panda providing rapid response and classification of malicious codes impacting Brazil. Brig. Gen. Antonino dos Santos Guerra Neto stated that Brazil has approximately 60,000 computers, experiencing an average of 100 probes daily across its 12 IT c...
Expert Insights Articles Videos
Cybersecurity Resources