Breaking News

Security Affairs newsletter Round 123 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived!

The best news of the week with Security Affairs.

·      Flaws in solar panels potentially threatening European power grids
·      Hackers leak the fourth episode of Game of Thrones season 7 online
·      Security Affairs newsletter Round 122 – News of the week
·      US Army bans use of Chinese DJI drones over cyber security concerns
·      British model Chloe Ayling kidnapped by Black Death group for auction in the dark web
·      Creator of the Ebury botnet sentenced to 46 months in jail
·      Experimental Mozilla Send service allows users share encrypted copy of huge files
·      FireEye Provides Update on the alleged data breach revealed late July
·      Black Hat 2017 – Hacking the electronic locks to open the doors could be easy
·      Hotspot Shield VPN threatens your privacy by injecting ads and JS into browsers
·      Irish electricity transmission system operator EirGrid targeted by a nation-state actor
·      Adobe patches 80 vulnerabilities in its products, including Flash Player, Reader, and Acrobat
·      Cyber criminals demand HBO millions to stop leaking its material
·      FBI masqueraded the NIT in a video-bait to unmask sextortionist on Tor
·      Mamba ransomware is back and targets organizations in Brazil and Saudi Arabia
·      A Self-driving car can be easily hacked by just putting stickers on road signs
·      Experts found a link between the KONNI attacks and DarkHotel campaigns against NK
·      SAP Security Patch Day – August 2017 addresses 19 vulnerabilities
·      Wikileaks – CIA CouchPotato remote tool can stealthy collect RTSP/H.264 video streams
·      APT28 hackers are leveraging NSA Hacking tool to spy on Hotels guests
·      Malware campaign targets Russian-Speaking companies with a new Backdoor
·      Mysterious company is offering up to $250,000 for VM Hacks through a bug bounty
·      Ukrainian Man charged with spreading the NotPetya ransomware
·      Crosstalk Leakage Attacks – USB gadgets can spy on data flowing in and out adjacent ports
·      DNA Contains Instructions for Biological and Computer Viruses
·      Variety reports a failed attempt of HBO to Offer a ‘Bug Bounty to hackers

Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.I desire to inform you that Security Affairs is now open to sponsored content..I desire to inform you that Security Affairs is now open to sponsored content.
I’ll offer the opportunity to:
•    Insert banners of various sizes in all the posts on Security Affairs.
•    Publish sponsored posts written by the customers that can include any kind of commercial reference.
•    Arrange a monthly/quarterly/annual campaign (for big customers) to advertise customers’ activities and discoveries.
For more info contact me at pierluigi.paganini@securityaffairs.co
Thanks for supporting Security Affairs.

Once again thank you!

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – Newsletter)

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 hours ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

5 hours ago

Linux variant of Cerber ransomware targets Atlassian servers

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…

18 hours ago

Ivanti fixed two critical flaws in its Avalanche MDM

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…

1 day ago

Researchers released exploit code for actively exploited Palo Alto PAN-OS bug

Researchers released an exploit code for the actively exploited vulnerability CVE-2024-3400 in Palo Alto Networks'…

1 day ago

Cisco warns of large-scale brute-force attacks against VPN and SSH services

Cisco Talos warns of large-scale brute-force attacks against a variety of targets, including VPN services,…

1 day ago

This website uses cookies.