Security News
![U.S. Senate Commerce, Science and Transportation Committee chairman requests info on White House breach (SC Magazine)](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
![Senate panel raises privacy concerns in White House hacking incident (Yahoo Security)](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
![Russian hackers accessed Obamas email in worrisome White House hit (Yahoo Security)](/static/build/img/news/alt/cyberthreat-stats-small.jpg)
![CozyDuke APT group believed to have targeted White House and State Department (SC Magazine)](/static/build/img/news/alt/ransomware-statistic-small.jpg)
![White House, State Department Counted Among CozyDuke APT Victims (Threatpost)](/static/build/img/news/alt/web-statistics-3-small.jpg)
A data-mining advanced persistent threat hit a handful of high profile targets last year, including the White House’s computer network.
![White House cyber attackers linked to OnionDuke APT actor (Help Net Security)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
It's widely believed that the October 2014 breaches of US State Department and White House computer systems have been executed by Russian hackers. Kaspersky Lab researchers have recently shared more d...
![CozyDuke APT Responsible for White House, State Department Attacks: Kaspersky (SecurityWeek)](/static/build/img/news/alt/DDoS-small.jpg)
![White House cyber-general says US must be able to cyber-nuke the worst of the cyber-worst (The Register)](/static/build/img/news/alt/Geopolitical-Cybersecurity-Predictions-small.jpg)
![White House's Daniel 'Intrigued' By UL-Type Model For IoT Security (Dark Reading)](/static/build/img/news/alt/breach-statistics-small.jpg)
![Pawn Storm cyberspies still at work, target NATO and the White House (Help Net Security)](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
Pawn Storm, the long-standing economic and political cyber-espionage operation that has been first detailed in October 2014, continues unabated. Aiming to compromise the targets' computers and Outl...