• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

 | 

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Security Affairs newsletter Round 503 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 503 by Pierluigi Paganini – INTERNATIONAL EDITION

Pierluigi Paganini December 22, 2024

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box.

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

BadBox rapidly grows, 190,000 Android devices infected
Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacksSophos fixed critical vulnerabilities in its Firewall product
U.S. CISA adds BeyondTrust software flaw to its Known Exploited Vulnerabilities catalog
Raccoon Infostealer operator sentenced to 60 months in prison
Mirai botnet targets SSR devices, Juniper Networks warns
Fortinet warns about Critical flaw in Wireless LAN Manager FortiWLM
CERT-UA: Russia-linked UAC-0125 abuses Cloudflare Workers to target Ukrainian army
US considers banning TP-Link routers over cybersecurity concerns
APT
Russia-linked APT29 group used red team tools in rogue RDP attacks
Threat actors are attempting to exploit Apache Struts vulnerability CVE-2024-53677
Irish Data Protection Commission (DPC) fined Meta €251 million for a 2018 data breach
The Mask APT is back after 10 years of silence
Texas Tech University data breach impacted 1.4 million individuals
The FBI warns of HiatusRAT scanning campaigns against Chinese-branded web cameras and DVRs
Russia FSB relies on Ukrainian minors for criminal activities disguised as “quest games”
U.S. CISA adds Microsoft Windows Kernel-Mode Driver and Adobe ColdFusion flaws to its Known Exploited Vulnerabilities catalog
ConnectOnCall data breach impacted over 900,000 individuals
Report claims that Serbian authorities abused Cellebrite tool to install NoviSpy spyware
Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise
PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms 

International Press – Newsletter

Cybercrime  

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide

Texas Tech University Data Breach Impacts 1.4 Million People 

Hacker Leaks Cisco Data

New fake Ledger data breach emails try to steal crypto wallets  

How to Lose a Fortune with Just One Bad Click  

Effective Phishing Campaign Targeting European Companies and Institutions  

Ukrainian National Sentenced to Federal Prison in “Raccoon Infostealer” Cybercrime Case  

Romanian National Sentenced to 20 Years in Prison in Connection with NetWalker Ransomware Attacks Resulting in the Payment of Millions of Dollars in Ransoms  

United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group  

ACE Shutters One of the Largest Live Sports Piracy Rings in the World  

Malware

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion  

Spyware distributed through Amazon Appstore  

BADBOX Botnet Is Back  

Supply Chain Attack on Rspack npm Packages Injects Cryptojacking Malware  

Hacking

Researchers find security flaws in Skoda cars that may let hackers remotely track them  

Exploit attempts inspired by recent Struts2 File Upload Vulnerability (CVE-2024-53677, CVE-2023-50164)

Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets  

Not All Roads Lead to PWN2OWN: Firmware Reverse Engineering (Part 2)  

Current State of SonicWall Exposure: Firmware Decryption Unlocks New Insights  

Investigating Malicious Hardware with Industrial CT  

Fortinet FortiWLM Deep-Dive, IOCs, and the Almost Story of the “Forti Forty”  

Intelligence and Information Warfare 

Glutton: A New Zero-Detection PHP Backdoor from Winnti Targets Cybercrimals 

“A Digital Prison”: Surveillance and the suppression of civil society in Serbia  

The SBU and the National Police detained minors in Kharkiv who were spying for the FSB under the guise of a quest game  

Hidden in Plain Sight: TA397’s New Attack Chain Delivers Espionage RATs  

Analyzing FLUX#CONSOLE: Using Tax-Themed Lures, Threat Actors Exploit Windows Management Console to Deliver Backdoor Payloads 

Trump administration wants to go on cyber offensive against China

Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks  

Cyberattack UAC-0125 using the theme “Army+” (CERT-UA#12559)  

Cybersecurity

ESET Threat Report H2 2024 

OpenAI whistleblower found dead in San Francisco

Irish Data Protection Commission fines Meta €251 Million  

Foreign hackers need to face real consequences, Mike Waltz says  

US considers ban on China’s TP-Link over security concerns, WSJ reports 

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)


facebook linkedin twitter

Cybercrime data breach Hacking hacking news information security news IT Information Security malware Newsletter Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini June 26, 2025
Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages
Read more
Pierluigi Paganini June 26, 2025
Cisco fixed critical ISE flaws allowing Root-level remote code execution
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

    Cyber Crime / June 26, 2025

    Cisco fixed critical ISE flaws allowing Root-level remote code execution

    Security / June 26, 2025

    U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

    Security / June 26, 2025

    CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

    Hacking / June 26, 2025

    Hackers deploy fake SonicWall VPN App to steal corporate credentials

    Hacking / June 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT