• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

OneClik APT campaign targets energy sector with stealthy backdoors

 | 

APT42 impersonates cyber professionals to phish Israeli academics and journalists

 | 

Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

 | 

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Security Affairs newsletter Round 510 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 510 by Pierluigi Paganini – INTERNATIONAL EDITION

Pierluigi Paganini February 09, 2025

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box.

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

PlayStation Network outage has been going on for over 24 hours
Kimsuky APT group used custom RDP Wrapper version and forceCopy stealer
Russia’s intelligence recruits Ukrainians for terror attacks via messaging apps
U.S. CISA adds Trimble Cityworks flaw to its Known Exploited Vulnerabilities catalog
Hospital Sisters Health System impacted 882,782 individuals
Attackers used a public ASP.NET machine to conduct ViewState code injection attacks
U.S. CISA adds Microsoft Outlook, Sophos XG Firewall, and other flaws to its Known Exploited Vulnerabilities catalog
Cisco addressed two critical flaws in its Identity Services Engine (ISE)
Notorious hacker behind 40+ cyberattacks on strategic organizations arrested
Lazarus APT targets crypto wallets using cross-platform JavaScript stealer
U.S. CISA adds Linux kernel flaw to its Known Exploited Vulnerabilities catalog
U.S. CISA adds Microsoft .NET Framework, Apache OFBiz, and Paessler PRTG Network Monitor flaws to its Known Exploited Vulnerabilities catalog
SparkCat campaign target crypto wallets using OCR to steal recovery phrases
International Civil Aviation Organization (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists
Online food ordering and delivery platform GrubHub discloses a data breach
Netgear urges users to upgrade two flaws impacting WiFi router models
AMD fixed a flaw that allowed to load malicious microcode
Coyote Banking Trojan targets Brazilian users, stealing data from 70+ financial apps and websites
Google fixed actively exploited kernel zero-day flaw
Web Skimmer found on at least 17 websites, including Casio UK
Crazy Evil gang runs over 10 highly specialized social media scams
Elon Musk ’s DOGE team granted ‘full access’ to sensitive Treasury systems. What are the risks?
Texas is the first state to ban DeepSeek on government devices
Law enforcement seized the domains of HeartSender cybercrime marketplaces
WhatsApp disrupted a hacking campaign targeting journalists with Paragon spyware
Ransomware attack hit Indian multinational Tata Technologies

International Press – Newsletter

Cybercrime

FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang  

“Crazy Evil” Cryptoscam Gang: Unmasking a Global Threat in 2024  

Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’?  

US Justice Department says cybercrime forum allegedly affected 17 million Americans  

Cybercrime is increasingly complex. Here’s how data awareness can help  

HTTP Client Tools Exploitation for Account Takeover Attacks  

Dangerous hacker responsible for more than 40 cyberattacks on strategic organizations arrested  

Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’?  

Malware

Malicious packages deepseeek and deepseekai published in Python Package Index  

Coyote Banking Trojan: A Stealthy Attack via LNK Files 

Go Supply Chain Attack: Malicious Package Exploits Go Module Proxy Caching for Persistence  

Rat Race: ValleyRAT Malware Targets Organizations with New Delivery Techniques 

Semantic Entanglement-Based Ransomware Detection via Probabilistic Latent Encryption Mapping

Hacking

DeepSeek Failed Over Half of the Jailbreak Tests by Qualys TotalAI    

Google fixes Android kernel zero-day exploited in attacks

2024 Trends in Vulnerability Exploitation  

Hacker Conversations: David Kennedy – an Atypical Typical Hacker 

Code injection attacks using publicly disclosed ASP.NET machine keys  

Intelligence and Information Warfare

macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed

Silent Lynx APT Targets Various Entities Across Kyrgyzstan & Neighbouring Nations  

Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam    

Spyware maker Paragon confirms US government is a customer

Google deletes policy against using AI for weapons or surveillance 

Russia uses messaging apps to recruit terrorists, Ukraine’s police says  

Persistent Threats from the Kimsuky Group Using RDP Wrapper

Cybersecurity

Texas governor orders ban on DeepSeek, RedNote for government devices   

Article 5: Prohibited AI Practices     

Elon Musk’s Doge team granted ‘full access’ to federal payment system  

Cyber Security 2025: Practical Trends Beyond the Hype  

Cyber agencies unveil new guidelines to secure edge devices from increasing threat 

Journalist targeted on WhatsApp by Paragon spyware: ‘I feel violated’  

How Agentic AI will be Weaponized for Social Engineering Attacks

Israeli Spyware Firm Paragon Cuts Italy’s Access After Journalists Targeted  

Student group sues Education Department over reported DOGE access to financial aid databases  

PSN down: PlayStation Network not working for almost a day as players left in dark

Apple’s ‘Dangerous’ iPhone Update Is Much Worse Than You Think      

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)


facebook linkedin twitter

Cybercrime data breach Hacking hacking news information security news IT Information Security malware Newsletter Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini June 27, 2025
OneClik APT campaign targets energy sector with stealthy backdoors
Read more
Pierluigi Paganini June 27, 2025
APT42 impersonates cyber professionals to phish Israeli academics and journalists
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    OneClik APT campaign targets energy sector with stealthy backdoors

    Hacking / June 27, 2025

    APT42 impersonates cyber professionals to phish Israeli academics and journalists

    APT / June 27, 2025

    Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

    Cyber Crime / June 26, 2025

    Cisco fixed critical ISE flaws allowing Root-level remote code execution

    Security / June 26, 2025

    U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

    Security / June 26, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT