• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 

Critical Sudo bugs expose major Linux distros to local Root exploits

 | 

Google fined $314M for misusing idle Android users' data

 | 

A flaw in Catwatchful spyware exposed logins of +62,000 users

 | 

China-linked group Houken hit French organizations using zero-days

 | 

Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

 | 

Europol shuts down Archetyp Market, longest-running dark web drug marketplace

 | 

Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

 | 

Cisco removed the backdoor account from its Unified Communications Manager

 | 

U.S. Sanctions Russia's Aeza Group for aiding crooks with bulletproof hosting

 | 

Qantas confirms customer data breach amid Scattered Spider attacks

 | 

CVE-2025-6554 is the fourth Chrome zero-day patched by Google in 2025

 | 

U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog

 | 

A sophisticated cyberattack hit the International Criminal Court

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Security
  • Security Affairs newsletter Round 4 – Best of the week from best sources

Security Affairs newsletter Round 4 – Best of the week from best sources

Pierluigi Paganini April 12, 2015

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box.

Firefox 37 arrives with Opportunistic Encryption support
Google Internet Authority G2 has become untrusted due to an expired certificate
Security Affairs newsletter Round 3 – Best of the week from best sources
How SEA hacked email accounts of Assad’s opponents
#OpISIS Anonymous published a list of 70 pro ISIS websites
Another phishing scam is targeting Yahoo users
Home Office – Cybercrime goes unpunished in the UK
Antivirus doesn’t work. So why are you still using it?
The hacker games that made beating security feel like a thrill
The Turkish Government banned YouTube, Facebook and Twitter
Snapchat Publishes First Transparency Report
Snowden Warns US Still Intercepts Intimate Emails
Car-Hacking Prototype Passes Crash Test
US Concerned by China But Not Adversary: Pentagon Chief
It’s time to research new ways to fight DDoS attacks
Key Observations from the Cybersecurity Marketplace
Data Breach – Hackers violated a server at Linux Australia
3 Of 4 Global 2000 Companies Still Vulnerable To Heartbleed
Supposed spook-buster Anonabox still insecure, says Cloak Project
Linux Australia hacked, warns personal details exposed
Popular crypto app uses XOR and nothing else, hacker says
Schneider Electric VAMPSET Software Vulnerability Detected, Causing Random Code Executed
Blockchain Technology Abuse: Time to Think About Fixes
Hacked nanny cam plays mysterious music to sleeping baby
AwSnap! New Hack Can Crash Chrome Browsers of Mass Audience
Cant patch this: Mozilla pulls encryption feature after just a WEEK
France accused of tabling Patriot Act style surveillance law
Anonymous Hackers Target Israeli Websites and Leak Credentials
White House Executive Order Declares Cyber National Emergency
Majority of Critical Infrastructure Firms in Americas Have Battled Hack Attempts: Survey
FBI Warns of Phony Sites Offering Government Services
Firefox disables opportunistic encryption to fix HTTPS-crippling bug
A CISO reveals why the cloud is your secret weapon for faster, better, and cheaper PCI audits
Black Hat USA 2015: Online Habits of 800 lb. Gorillas
So, You Dont Believe In Security Education?
Vulnerability Forces Mozilla to Disable Opportunistic Encryption in Firefox
iSIGHT Partners Scoops Up ICS Security Firm Critical Intelligence
Popular crypto app uses single-byte XOR and nowt else, hacker says
Supposed spy-busting Anonabox insecure, says Cloak Project
AwSnap malformed HTML exploit crashes Chrome in one click
Flaw in WP-Super-Cache plugin threatens million of WordPress websites
Lazy Remediation Leaves Most Global 2000 Firms Vulnerable to Heartbleed Flaw: Report
Peristent XSS Vulnerability Plagues WordPress Plugin
Mozilla Disables Opportunistic Encryption in Firefox After Security Flaw Discovered
BrandPost: Fear Nothing: A Gamer’s Approach to Building a SOC
Researchers Track Journey of Data Across Cyber Underground
BrandPost: FedRAMP: What You Need To Know
Beware of pro-ISIS script kiddies exploiting WordPress sites, FBI warns
A bloody mess: Vast majority of organizations are still vulnerable to Heartbleed
3 Internet Of Things Devices That Threaten More Than Your Data
Welcome to the Internet of Things. Please check your privacy at the door.
SSL flaw forces Mozilla to pull Opportunistic Encryption
Aw snap! How hideous HTML can crash Chrome tabs in one click
Cant patch this: Mozilla pulls Firefox encryption feature after just a week
Your home automation things are a security nightmare
Trustwaves off to Singapore as Singtel slurps security company
Cisco pitches security for SMEs
Most top corporates still Heartbleeding over the internet
Cyber War Games: Top 3 Lessons Learned About Incident Response
WP-Super-Cache vulnerability potentially leaves 1 million+ websites exposed
Singtel to Acquire Trustwave for $810 Million
Russian hackers used State Dept. systems to Phish White House staffers
White House Says Secure Systems Not Hacked
Aw, snap! How huge HTML links can crash Chrome tabs in one click
Lazy Remediation Leaves Most Global 2000 Firms Vulnerable After Heartbleed Flaw: Report
FAA systems hit by malware-based attack earlier 2015
A MILLION Chrome users data was sent to ONE dodgy IP address
Google Ads go NUCLEAR, foist exploit kit
Malware writers take a page from the spam industry to evade detection
How Russians hackers breached the White House unclassified network
This will crack you up: US drug squads phone call megaslurp dates back to 1990s
Two NTP Key Authentication Vulnerabilities Patched
Hackers hide malware in fake game pages hosted on Steam
Review: Anonabox or InvizBox, which Tor router better anonymizes online life?
A flawed ransomware encryptor
Using Office 365 at work? Its dangerous to go alone! Take this…
Denial of service attacks pour through rift in Network Time Protocol
LG monitor software quietly kills UAC, dev says
Cisco security software needs security patch
New Coalition Forms to End Mass US Surveillance
DARPA-funded team says it can SMELL Android malware
French TV5Monde Channel Hit by Pro-Islamic State Hackers
FBI warns of attacks against WordPress-based sites run by ISIS sympathizers
Apple iOS 8.3 Includes Long List of Security Fixes
AlienSpy RAT exploited to deliver the popular Citadel Trojan
Google sticks anti-SQL injection vaccine into MySQL MariaDB fork
DARPA is developing a tool do detect Android Malware
Apple Leaves CNNIC Root in iOS, OSX Certificate Trust Lists
Solving the Right Problem: Stop Adversaries, Not Just Their Tools
ISIS hackers belonging Cyber Caliphate team overtake French TV5Monde
Hotel Operator White Lodging Struck Again by PoS Attack
French TV network blames an Islamist group for 11-station blackout
Own a WordPress Website? ISIS is After You — FBI warns
Beebone Botnet Taken Down By Another Security Team-Up
Hacked French network exposed its own passwords during TV interview
Beebone botnet has been shut down by an international operation
Education Sector Struggles With Botnets: BitSight
Latest version of OS X closes Backdoor-like bug that gives attackers root
Utilities And Education The Most Bot-Infested Sectors
Compliance: An Often Overlooked, Powerful Method of Threat Prevention
Cyber-crypto-criminal-cock-up. Little money and (probably) embarrassed
Operation Buhtrap: New Spyware is targeting Russian Banking Sector
Wi-Fi hotspots can put iPhones into ETERNAL super slow-mo
Tv5Monde revealed his own passwords in an interview
Darwin Nuke
Cybercrime taskforce collects huge botnet scalp on first go
AT&Ts data breach settlement called a slap on the wrist
Local Police Listening Your Cell-Phone Without a Warrant
National Power Grid suffers frequent cyberattacks, says report
Hacked French broadcasters passwords revealed in TV broadcast
Beebone Botnet Takes Down By International Cybercrime Taskforce
Apple Finally Patches Rootpipe Privilege Escalation Flaw in OS X
Older Versions of OS X Remain Vulnerable to Rootpipe ‘Hidden Backdoor API’
Vulnerability in common hotel routers threatens guest devices
Insider Threats: Focus On The User, Not The Data
Beebone Botnet Taken Down By International Cybercrime Taskforce
Great Cannon, the powerful Chinese hacking platform
China weaponizes its Great Firewall into the GREAT FIRE CANNON, menaces entire globe
China Using A Powerful Great Cannon Weapon to Censor The Internet
A Closer Look at the Dridex Trojan After Some Recently Received E-mails
Fake NYPD Badges available for sale on dark web
China weaponizes its Great Firewall into the GREAT FIRE CANNON, menaces entire world
Lufthansa customers were targeted by a cyber attack

Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.


 

newsletter

Once again thank you!

Pierluigi Paganini

(Security Affairs – Newsletter, SecurityAffairs)


facebook linkedin twitter

cyber security Newsletter Security Affairs

you might also like

Pierluigi Paganini July 07, 2025
Taiwan flags security risks in popular Chinese apps after official probe
Read more
Pierluigi Paganini July 07, 2025
U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    New Batavia spyware targets Russian industrial enterprises

    Uncategorized / July 07, 2025

    Taiwan flags security risks in popular Chinese apps after official probe

    Security / July 07, 2025

    U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

    Hacking / July 07, 2025

    Hunters International ransomware gang shuts down and offers free decryption keys to all victims

    Cyber Crime / July 06, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

    Security / July 06, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT