• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Android Malware Konfety evolves with ZIP manipulation and dynamic loading

 | 

Belk hit by May cyberattack: DragonForce stole 150GB of data

 | 

North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

 | 

FBI seized multiple piracy sites distributing pirated video games

 | 

An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

 | 

Interlock ransomware group deploys new PHP-based RAT via FileFix

 | 

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Breaking News

Pierluigi Paganini January 01, 2017
Firefox 52 more privacy oriented with a Tor protection mechanism

Mozilla development team announced a new privacy protection mechanism that will come with Firefox 52, it aims to prevent websites from fingerprinting users. Mozilla announced the introduction of a new privacy protection mechanism to Firefox 52 that prevents websites from fingerprinting through system fonts. The technique is widely adopted by advertising companies via hidden scripts delivered with […]

Pierluigi Paganini January 01, 2017
A new iPhone bug will crash the Messages app with a single text

A researcher discovered that a single text message could be exploited to crash the Messages app by MMS on iOS due to a recently discovered bug A single text message could be exploited to disable the Messages app on any iPhone due to a recently discovered bug. The bug flaw makes the Apple Message app inoperable, making it […]

Pierluigi Paganini December 31, 2016
Alleged Russian operation has compromised a laptop at a Vermont utility

The code associated with Russian hacking operation dubbed Grizzly Steppe by the Obama administration infected a laptop at a Vermont utility. Russian hackers are again in the headlines because according to US officials, they hacked a Vermont utility, raising concerns about the security of the electrical grid of the country. Researchers discovered on a laptop a […]

Pierluigi Paganini December 31, 2016
#OpSingleGateway – Gh0s7 hacked Thai Government website in response to the recent arrests

#OpSingleGateway – The hacker Gh0s7 hacked the Thailand’s National Statistical Office (http://nso.go.th) in response to the recent arrests operated by the Government. The hacker Gh0s7 broke into the database of the Thailand’s National Statistical Office (http://nso.go.th ) and leaked data through the Mega service at the following URL https://mega.nz/#!F8o0kCLb!8C30-rqQip7cvKhf-af3xwNX6PXO6KGN9wDEon5XqEs The hacker acted alone, he decides to hack into a […]

Pierluigi Paganini December 31, 2016
FBI-DHS JAR report links Russian hackers to Presidential Election hacks

A FBI-DHS JAR report released implicated Russian hacking group APT28 and APT29 in attacks against 2016 Presidential Election. The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published on Thursday a Joint Analysis Report(JAR) that provides information about the tools, infrastructure and TTPs used by the Russian civilian and military intelligence […]

Pierluigi Paganini December 31, 2016
In 2017: Cool New Tech, Ominous Cyber Threats & Increased Terrorism in the West

A lot of new and exciting technology will emerge or become more prominent in 2017 and the following is just a glimpse of what is anticipated. IoT & Smart Home Tech Smart home technology had been in the works for years before finally getting off to a relatively slow start. But, now that large companies […]

Pierluigi Paganini December 30, 2016
Sundown Exploit Kit now leverages on the steganography

A new variant of the Sundown exploit kit leverages on steganography to hide exploit code in harmless-looking image files. Security experts from Trend Micro have spotted a new version of the Sundown exploit kit that exploits steganography in order to hide malicious code in harmless-looking image files. The use of steganography was recently observed in the malvertising campaigns conducted […]

Pierluigi Paganini December 30, 2016
CheckPoint experts spotted Three Critical 0-Day in PHP 7

Researchers at the security firm CheckPoint have discovered three fresh critical zero day vulnerability in the last PHP 7. Security researchers at the firm CheckPoint have discovered three fresh critical 0-day vulnerabilities in last PHP 7. These vulnerabilities allow an attacker to take full control over 80 percent of websites which run on the latest release […]

Pierluigi Paganini December 30, 2016
President Obama executive order ejected 35 Russians out of US

An executive order issued by President Obama applies sanctions on Russian military and intelligence officials. 35 Russian operatives were ejected. President Barack Obama issued an executive order to impose sanctions on a number of Russian military and intelligence officials in response to the alleged hacking campaigns against the 2016 US Presidential Election. The US ejected 35 Russian intelligence […]

Pierluigi Paganini December 30, 2016
Hacker Interview @Firox_ – Security Affairs

Today I have the pleasure to interview @Firox_, one of the most intriguing characters of the hacking community. You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. Well, unlike most hackers out there, I do not publicly participate in campaigns or operations under this […]

  • 1
  • 2
  • ...
  • 1238
  • 1239
  • 1240
  • 1241
  • 1242
  • ...
  • 1504
  • 1505
  • 1506

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Android Malware Konfety evolves with ZIP manipulation and dynamic loading

    Malware / July 15, 2025

    Belk hit by May cyberattack: DragonForce stole 150GB of data

    Data Breach / July 15, 2025

    North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

    Hacking / July 15, 2025

    FBI seized multiple piracy sites distributing pirated video games

    Cyber Crime / July 15, 2025

    An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

    Hacking / July 15, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT