• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Breaking News

Pierluigi Paganini June 26, 2015
Darknets in the Deep Web, the home of assassins and pedophiles

Security experts at Trend Micro published a report on the Deep Web and related illegal activities that exploit the darknets it contains. Experts at TrendMicro published an interesting report on the Deep Web focusing their analysis on the services and products available in the dark part of the internet that is not indexed by the principal search […]

Pierluigi Paganini June 25, 2015
Facebook’s astonishing AI algorithm in Facial Recognition

Facebook developed an astonishing algorithm for facial recognition considered as the latest Artificial Intelligence step, it’s name is PIPER. Artificial Intelligence has been playing an important role to offer better and outstanding features in applications and a lot of computer giants and agencies have spent huge amount of money to acquire more and more. Facebook […]

Pierluigi Paganini June 25, 2015
The Winnti hacking crew is now targeting pharmaceutical and telecoms companies

Security experts at Kaspersky collected evidence that the Winniti APT is moving beyond the gaming industry targeting telecoms and big pharma companies. My most passionate readers, will remember for sure the Winnti group, a Chinese APT discovered by Kaspersky Lab in 2013 that targeted companies in the gaming industry. According to the experts, the Winnti gang has been active […]

Pierluigi Paganini June 25, 2015
Bad Actors behind the Dyre botnet operates like a business

Experts at Symantec observed a significant upsurge in activity over the past year for the Dyre financial Trojan used to target banking customers worldwide The operators behind the popular Dyre banking trojan appear very active in this period, according to security experts at Symantec they are working hard five-day a week to maintain some 285 command […]

Pierluigi Paganini June 25, 2015
Blackshades mastermind sentenced to almost five years in prison

Swedish Co-Creator Of Blackshades RAT was sentenced by the US authorities to 57 months in prison. Another success of the law enforcement against cybercrime. A New York federal court sentenced Alex Yücel (a.k.a. “marjinz“), a Swedish man, who is the alleged mastermind behind the BlackShades Remote Access Tool (RAT). BlackShades is a popular RAT in the […]

Pierluigi Paganini June 24, 2015
Be aware Samsung disable Windows Update to run its bloatware

The security researcher Patrick Barker discovered that Samsung is disabling Windows Update to run its own bloatware opening users to cyber attacks. The security researcher Patrick Barker discovered that Samsung is disabling Windows Update to run its own bloatware leaving is customers wide open to cyber attack. Barker discovered that Samsung disable Windows update after a […]

Pierluigi Paganini June 24, 2015
ScryptCC hacked, large amount of Bitcoin stolen. DO NOT DEPOSIT!

Altcoin cloud mining hash power online marketplace ScryptCC has been hacked and a large amount of Bitcoin was stolen by the attacker. The news of another clamorous case of Bitcoin theft is circulating on the Internet, Altcoin cloud mining hash power online marketplace ScryptCC has been hacked. In time I’m writing it is not known […]

Pierluigi Paganini June 24, 2015
Google accused, Chromium eavesdropping tool installed on computers without permission

Privacy advocates claim snooping component was activated within Chromium, potentially exposing private conversations. Privacy advocates are accusing Google. Privacy advocates and open source developers claim over the secret installing of Google software which is capable of listening in on conversations held in the surrounding environment. It seems that the listening component was involuntarily activated within […]

Pierluigi Paganini June 24, 2015
Cryptowall cost victims $18 Million since 2014 warns FBI

Between April 2014 and June 2015, the IC3 received 992 CryptoWall related complaints, with victims reporting losses totaling over $18 million. Cryptowall is one of the most nefarious ransomware in the wild, in twelve months the FBI has estimated that the overall losses were more than $18 million. Ransomware implements a classic extortion scheme typically demanding that victims pay ransom […]

Pierluigi Paganini June 24, 2015
NIST releases cyber security guidelines for government contractors

The NIST has published a document for protecting Controlled Unclassified Information (CUI) when it resides on contractors IT infrastructures. The National Institute of Standards and Technology (NIST) has published a guideline, titled “Publication Citation: Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations“, for protecting Controlled Unclassified Information (CUI) when it resides on contractor IT […]

  • 1
  • 2
  • ...
  • 1457
  • 1458
  • 1459
  • 1460
  • 1461
  • ...
  • 1504
  • 1505
  • 1506

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

    Data Breach / July 14, 2025

    Experts uncover critical flaws in Kigen eSIM technology affecting billions

    Security / July 14, 2025

    Spain awarded €12.3 million in contracts to Huawei

    Intelligence / July 14, 2025

    Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

    Security / July 13, 2025

    Wing FTP Server flaw actively exploited shortly after technical details were made public

    Hacking / July 13, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT