• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Zero Day Quest returns: Microsoft ups the stakes with $5M bug bounty

 | 

Cisco disclosed a CRM data breach via vishing attack

 | 

Exposed Without a Breach: The Cost of Data Blindness

 | 

SonicWall investigates possible zero-day amid Akira ransomware surge

 | 

Chaining NVIDIA's Triton Server flaws exposes AI systems to remote takeover

 | 

Hacking group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer

 | 

Northwest Radiologists data breach hits 350,000 in Washington

 | 

PlayPraetor Android RAT expands rapidly across Spanish and French-speaking regions

 | 

Lovense flaws expose emails and allow account takeover

 | 

Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024

 | 

Akira Ransomware targets SonicWall VPNs in likely zero-day attacks

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 56

 | 

Security Affairs newsletter Round 535 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

New Linux backdoor Plague bypasses auth via malicious PAM module

 | 

China Presses Nvidia Over Alleged Backdoors in H20 Chips Amid Tech Tensions

 | 

Malicious AI-generated npm package hits Solana users

 | 

Meta Offers $1M bounty at Pwn2Own Ireland 2025 for WhatsApp exploits

 | 

ToolShell under siege: Check Point analyzes Chinese APT Storm-2603

 | 

CISA released Thorium platform to support malware and forensic analysis

 | 

Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Breaking News

Pierluigi Paganini July 31, 2016
Proxy PAC hack allows for intercept of HTTPS URLS

Israeli experts discovered a vulnerability within the JavaScript that proxy PAC files that allows HTTPS URLs interception via Proxy Attacks. Israeli security firm, Safebreach, has discovered a vulnerability within the JavaScript that proxy PAC files used for auto-configuration. Hackers could be used to extrapolate URLs and manipulate them. Proxy Auto Config or PAC files work […]

Pierluigi Paganini July 31, 2016
The Great Spyware sale: SpyNote available for free use

Palo Alto Networks recently discovered a Remote Access Trojan dubbed SpyNote that is free available allowing anyone to launch attacks in the wild. I love when the sale happens in malls. People just rush and want to get good things for cheap prices. And who doesn’t love something free? The spyware and malware market is highly lucrative when […]

Pierluigi Paganini July 31, 2016
Security Affairs newsletter Round 71 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Hacker Interviews – NeckrosTheTerrible Akamay Threat Advisory – Evolution of DDoS attacks Security Affairs newsletter […]

Pierluigi Paganini July 31, 2016
Danger Drone, the flying hacking machine devised by a cyber security duo

A security duo designed a hacking UAV dubbed Danger Drone, with it a drone equipped with a tiny PC that run a suite of hacking tools. What do you think if I propose you to use a drone to hack into a network? And what about air-gapped networks hacking? In order to hack into an isolated network, the […]

Pierluigi Paganini July 30, 2016
Russian Intelligence says a spyware infected state agencies in a coordinated attack

The Russian Intelligence agency, the FSB, announced the discovery of a spyware in the computer networks belonging to at least 20 organizations. While security experts and the US law enforcement speculate the involvement of Russian state-sponsored hackers behind the DNC hack, the Federal Security Service, the FSB, announced the discovery of a spyware in state […]

Pierluigi Paganini July 30, 2016
Clinton campaign servers were accessed as part of DNC hack

Media outlet continues to publish news regarding the DNC hack, computer servers used by Clinton campaign were compromised as part of DNC hack. The news of the recent Democratic National Convention (DNC) hack is monopolizing the technological debate around the US presidential campaign. Yesterday I reported the news of another hack against the operation of the DNC, according to the Reuters, […]

Pierluigi Paganini July 30, 2016
DCCC website redirected donors to a fake contribution page

Another attack hit the Democratic Party organization, this time, the Democratic Party’s congressional fundraising DCCC committee was hit by hackers. The Democratic Party organization continues to be under attack, this time, the Democratic Party’s congressional fundraising committee was hit by hackers. According to the Reuters, the FBI is investigating a security breach of the systems of the […]

Pierluigi Paganini July 29, 2016
South accuses North Korea for massive data breach affecting 10 million online shoppers

Authorities in South Korea are blaming hackers from North Korea for a massive data breach affecting 10 million Interpark online shoppers. North Korea launched a new cyber attack against the South, according to the Government of Seoul a massive data breach exposed data belonging to an Internet shopping mall. This week, authorities in South Korea accused […]

Pierluigi Paganini July 29, 2016
The Detox Ransome hacker stole Democratic National Committee DB in 2015

The notorious hacker Detox Ransome was searching for Heartbleed vulnerable servers when found and stole a Democratic National Committee DB in 2015. According to The Epoch Times, the notorious hacker Detox Ransome stole Democrat Databases in 2015. In September 2015, the hacker breached a service linked to the operations of the Democratic National Committee accessing the internal database. Detox […]

Pierluigi Paganini July 29, 2016
Scammers exploit recent wave of attacks to trick victims with phishing attacks

Scammers exploit the recent a wave of attacks to trick victims with phishing offensive and steal sensitive data from the unaware users. Crooks always exploits the media attention on tragic events for their illegal activities and trick victims with social engineering techniques. Experts observed scammers in the past exploiting news like the crash of Malaysia Airlines […]

  • 1
  • 2
  • ...
  • 1307
  • 1308
  • 1309
  • 1310
  • 1311
  • ...
  • 1512
  • 1513
  • 1514

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Zero Day Quest returns: Microsoft ups the stakes with $5M bug bounty

    Hacking / August 05, 2025

    Cisco disclosed a CRM data breach via vishing attack

    Data Breach / August 05, 2025

    Exposed Without a Breach: The Cost of Data Blindness

    Security / August 05, 2025

    SonicWall investigates possible zero-day amid Akira ransomware surge

    Security / August 05, 2025

    Chaining NVIDIA's Triton Server flaws exposes AI systems to remote takeover

    Security / August 05, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT