• Home
  • Demo
  • Contact
 
  • Home
  • Our Story
    • Overview
    • Testimonials
    • Industry Recognition
    • Leadership
    • Board of Advisors
  • Our Products
    • Threat Landscape
    • Javelin AD | Protect
    • How It Works
    • IR, Hunting, Breach Containment
    • Solution Architecture
    • Features & Benefits
  • AD Assessment
  • Blog
  • News
  • Press Releases
  • Almog Ohayon Mar 14, 2017

    CIA Leak - The Enterprise Perspective

    By Almog Ohayon | March 14, 2017

    Edward Snowden was right about CIA hacking activities: they are going to lose control of their “weaponized gun” — and it’s going to be ugly.

    On March 7th, 8,761 documents and files were leaked from the CIA to Wikileaks introducing the scope and direction of the CIA’s global covert hacking program, its malware arsenal, and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products: Apple iPhone, Google Android, Microsoft Windows, and even Samsung smart TVs, which are turned into covert microphones.

    Read More..

    [gs_lp_like_post] 0 responses

    Tags

    Active Directory apt10 cia DFIR espionage Forensics Incident Response IR Mimikatz nsa Powershell ransomware Samas

    Categories

  • Blog
  • Press Releases
“LETS PLAN AN APT”
GET THE A3 POSTER
THE TRUTH BEHIND APT
Get the White Paper now
DOWNLOAD
AD ASSESSMENT
Exposed? At risk? Check if an attack left backdoors or hooks behind.
GET AD ASSESSMENT
Story
  • Testimonials
  • Industry Recognition
  • Leadership
  • Board of Advisors
  • Contact Us
  • Blog
Products
  • Threat Landscape
  • Javelin AD | Protect
  • How It Works
  • IR, Hunting, Breach Containment
  • Solution Architecture
  • Features & Benefits
  • Javelin
  • Privacy
  • Terms of Use