• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Breaking News

Pierluigi Paganini June 23, 2015
Adobe fixed the CVE-2015-3113 that is being exploited in the wild

Adobe has released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is being actively exploited in the wild. Security experts at FireEye discovered a critical heap buffer overflow vulnerability, coded CVE-2015-3113, that affects Adobe systems. FireEye discovered that the Adobe flaw is being exploited in the wild by the hacking crew […]

Pierluigi Paganini June 23, 2015
Microsoft will not patch an IE exploit affecting million 32bit systems

Security expert Dustin Childs publicly disclosed a Microsoft IE exploit that affects only 32-bit IE platforms which are currently used by millions of users. The HP security expert Dustin Childs publicly disclosed a Microsoft IE exploit based on a flaw that resides in the Address Space Layout Randomisation (ASLR). The ASLR is a security feature implemented […]

Pierluigi Paganini June 23, 2015
Disclosed new information about Tor sites

A security researcher is trying to harvest information about Tor sites that propose illegal products, and in some cases he even discovered their address. The Dark Web is known to be “the place” for sites where it can be found drugs, child pornography, weapons, because these websites can live on without disclosing the server location […]

Pierluigi Paganini June 23, 2015
What is the Dark Web and Why is it so popular?

What is the Dark Web? Unveiling the myth of the Dark Web and making sure that people understand its magnitude and its limitations. Let’s begin by explaining what the so called “Dark Web” actually is. This is a term used to describe a collection of websites that may be publicly visible, but they hide information […]

Pierluigi Paganini June 23, 2015
NSA and GCHQ target security firm including Kaspersky

Documents leaked by Edward Snowden show the NSA and the GCHQ efforts to compromise security software companies including Kaspersky Lab.  A new collection of documents leaked by the popular whistleblower Edward Snowden reveals that both UK and US government intelligence agencies are targeting principal security firms and security companies. Kaspersky Lab calls nation-states’ targeting of security companies […]

Pierluigi Paganini June 22, 2015
Kevin Mitnick explains how to hack fiber optic and steal sensitive data

The popular hacker Kevin Mitnick explains how it is easy to steal data from a network tapping the cable, even if it’s a fiber optic network. Kevin Mitnick demonstrates how easy it is for a hacker to tap into your network and read your email messages, even if it’s a fiber optic network. Kevin Mitnick […]

Pierluigi Paganini June 22, 2015
Isis’s propaganda machine hunted down by Europol Web unit

The Europol announced the creation of a team that aims to find key figures in propaganda campaigns run by ISIS members seeking to recruit foreign fighters. Isis‘s machine propaganda is a very important target, since it generates something like 100.000 daily tweets, and it’s used to recruit foreign fighters to support the group. Isis is gaining […]

Pierluigi Paganini June 22, 2015
Hackers targeted the Polish Airline LOT, grounded 1,400 Passengers

A cyber attack against the ground computer systems of the Polish flagship carrier LOT grounded more than 1,400 passengers at Warsaw’s Okecie airport. The Polish national airline, LOT, announced on Sunday that it has cancelled 10 flights due to a cyber attack against the airline’s ground computer systems at Warsaw’s Okecie airport. “Today afternoon LOT […]

Pierluigi Paganini June 21, 2015
Signal amplification and brute-force attack for car thieves

A recent wave of car burglaries raises the debate on possible hacking techniques adopted by car thieves .. Signal amplification and brute-force attacks. A few months ago the journalist Nick Bilton wrote about his car being broken into in front of him. Bilton believes that his car was stolen by using snatched with the help of a signal […]

Pierluigi Paganini June 21, 2015
Electronic Frontier Foundation – WhatsApp ranked as the worst at protecting users’ privacy

The Electronic Frontier Foundation published the “Who Has Your Back? 2015” report that ranked WhatsApp ranked as the worst in protecting users’ privacy. The Electronic Frontier Foundation has published its annual report “Who Has Your Back? 2015: Protecting Your Data From Government Requests” that analyzes how private companies handlesusers data with specific focus on Government surveillance. “Which […]

  • 1
  • 2
  • ...
  • 1458
  • 1459
  • 1460
  • 1461
  • 1462
  • ...
  • 1504
  • 1505
  • 1506

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

    Data Breach / July 14, 2025

    Experts uncover critical flaws in Kigen eSIM technology affecting billions

    Security / July 14, 2025

    Spain awarded €12.3 million in contracts to Huawei

    Intelligence / July 14, 2025

    Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

    Security / July 13, 2025

    Wing FTP Server flaw actively exploited shortly after technical details were made public

    Hacking / July 13, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT