• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber Crime
  • Cyber warfare
  • Digital ID
  • Hacking
  • Intelligence
  • Malware
  • Security Affairs newsletter Round 24 – Best of the week from best sources

Security Affairs newsletter Round 24 – Best of the week from best sources

Pierluigi Paganini August 30, 2015

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box.

Who are the Ashley Madison users?
Hacking the Iridium network could be very easy
Amazon to trash Flash, as browsers walk away
Keyless Cars: A New Frontier For Bug Bounties?
How to reclaim your privacy in Windows 10, piece by piece
Zero-Day Flaws Found in Dolphin, Mercury Browsers for Android
How does facial recognition technology work?
Chinese spies target US intellectual property
Hack Codegen – Facebook Open-Sources Code That Writes Code
New Android Vulnerable Lets Hackers Take Over Your Phone
Hacker slaps Dolphin, Mercury browsers, squirts zero day
Ashley Madison hack linked to suicide, spam, and public outrage
Even super hackers leave entries in logs, so prepare to drown in data
Thousands Britons’s hard drives easy to hack with Shodan info
Yammer security sub-standard says US Veterans Affairs Dept
Cyber espionage campaign targets India and Tibetan activists
AlienSpy RAT Resurfaces as JSocket
When car hacking has become a scaring reality
Dyre Trojan Uses Semi-Random File Names to Evade Detection
Sexy Girl Devises a 3D Printed High-Heeled Shoes with Hacking Tools Inside
Samsung smart fridge opens Gmail login to hack
Carders fleece $4.2 million from Victorias MyKi transport agency
Ashley Madison offers a $500,000 reward for the culprits
Russian Lawyers want ban Windows 10 from govt offices
Sven Sakkov Appointed Director of NATO CCDCOE
Were Looking at Information Sharing The Wrong Way
Security Stands As Top Factor In Digital Brand Confidence
LG phones most exposed to new Certifi-gate vulnerability
Google Pulls App Exploiting Certifi-Gate Vulnerability
Wyndham vs. FTC: Corporate security pros need to lawyer up about data breach protection, experts say
An Ashley Madison response plan: does your company have one?
Major Android remote-access vulnerability is now being exploited [Updated]
Devs are SHEEP. Which is good when the leader writes secure code
GitHub wobbles under DDOS attack
Ashley Madison hacked potential competitor, leaked emails suggest
4 security metrics that matter
iOS Sandbox Vulnerability Puts Enterprise Data at Risk
Aviva phone hacker jailed for 18 months over revenge attack
Most corporate risk due to just 1% of employees
Kellys Glimpse Of Black Hat
Researchers Uncover New Italian RAT uWarrior
When to host your Websites security
GitHub Again Hit by DDoS Cyberattack
Sphinx, a new variant of Zeus available for sale in the underground
PayPal critical Flaw allows to steal all your funds
Be aware enterprises, it’s time to block Tor network
GitHub Again Hit by a new DDoS attack
Malware menaces poison ads as Google, Yahoo! look away
Ciscos RAT-catchers spot sysadmin-targeted phish
FireEye intern VXer pleads guilty for Darkode droid RAT ruse
Why is the smart home insecure? Because almost nobody cares
CERT warns of hard-coded credentials in home routers
British-born ISIS Hacker Killed in US Drone Strike in Syria
More than 80% of healthcare IT leaders say their systems have been compromised
Consumers Want Password Alternatives
AT&T Wi-Fi hotspot caught injecting ads into web pages
Apple iOS Jailbreak Tweaks Have Backdoors; 220,000 iCloud Accounts Hacked
Ashley Madison, who hacked it? The Krebs’s opinion
BitTorrent patched against flaw that allowed crippling DoS attacks
Vote now: Who can solve a problem like Ashley Madison?
Adobe Hotfix Patches XXE Vulnerability in ColdFusion
German Spy-Agency Trades Citizens Metadata in Exchange for NSAs Xkeyscore
Scanner Finds Malicious Android Apps at Scale
BitTorrent patches flaw that could amplify distributed denial-of-service attacks
The US government created new rules for Cloud Providers
Endress+Hauser Patches Vulnerability in ICS Products
RiskIQs Arian Evans Talks Up Hunting Down Digital Assets
Adobe Releases Hotfix to Patch ColdFusion Vulnerability
Malvertising maniac messes MSN, serves corrupted creative
Google makes it official: Chrome will freeze Flash ads on sight from Sept 1
BitTorrent kills bug that turns networks into a website-slaying weapon
Google tells iOS 9 app devs: Switch off HTTPS if you want that sweet sweet ad money from us
FBI: Social Engineering, Hacks Lead to Millions Lost to Wire Fraud
Spaniard claims WWII WAR HERO pigeon code crack. Explain please
NCA arrests six Lizard Squad users after gaming firms, retailers targetted
iOS vulnerability Ins0mnia fixed by Apple
Disgusting! Ashley Madison was Building an App – Whats your Wife Worth?
Xkeyscore: the secret Germany’s deal with the NSA
Spooks, plod and security industry join to chase bank hacker
Symantec discovered 49 New Modules of the Regin espionage platform
How Hackers Could takeover Facebook business pages
Uber hires researchers who hacked Chrysler Uconnect
Amazon dumps Flash, and the Web is better off
FBI warns that Business Email Scams are raising
The 7 Most Common RATS In Use Today
Uber pulls up to the bumper, ropes in Jeep hackers
Google Chrome will freeze Flash content and ads from Sept 1st
Alleged Russian hackers behind the EFF Spear phishing Scam

Email address: Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.

newsletter

Once again thank you!

Pierluigi Paganini

(Security Affairs – Newsletter, SecurityAffairs)


facebook linkedin twitter

you might also like

Pierluigi Paganini June 26, 2025
U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog
Read more
Pierluigi Paganini June 26, 2025
CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

    Security / June 26, 2025

    CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

    Hacking / June 26, 2025

    Hackers deploy fake SonicWall VPN App to steal corporate credentials

    Hacking / June 25, 2025

    Mainline Health Systems data breach impacted over 100,000 individuals

    Data Breach / June 25, 2025

    Disrupting the operations of cryptocurrency mining botnets

    Malware / June 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT