• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Microsoft unveils Project Ire: AI that autonomously detects malware

 | 

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

 | 

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

 | 

How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments

 | 

WhatsApp cracks down on 6.8M scam accounts in global takedown

 | 

Trend Micro fixes two actively exploited Apex One RCE flaws

 | 

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

 | 

Google fixed two Qualcomm bugs that were actively exploited in the wild

 | 

Zero Day Quest returns: Microsoft ups the stakes with $5M bug bounty

 | 

Cisco disclosed a CRM data breach via vishing attack

 | 

Exposed Without a Breach: The Cost of Data Blindness

 | 

SonicWall investigates possible zero-day amid Akira ransomware surge

 | 

Chaining NVIDIA's Triton Server flaws exposes AI systems to remote takeover

 | 

Hacking group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer

 | 

Northwest Radiologists data breach hits 350,000 in Washington

 | 

PlayPraetor Android RAT expands rapidly across Spanish and French-speaking regions

 | 

Lovense flaws expose emails and allow account takeover

 | 

Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024

 | 

Akira Ransomware targets SonicWall VPNs in likely zero-day attacks

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 56

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Breaking News

Pierluigi Paganini January 04, 2019
Flaw in Skype for Android exposes photos and contacts

A security expert found a flaw in Skype for Android that could be exploited by an unauthenticated attacker to view photos and contacts, and even open links in the browser. Security expert Florian Kunushevci (19) discovered a vulnerability that allows an unauthenticated local attacker to view photos and contacts, and also to open links in […]

Pierluigi Paganini January 04, 2019
New NRSMiner cryptominer NSA-Linked EternalBlue Exploit

A new variant of the NRSMiner is infecting users in the southern region of Asia, most of the victims are in Vietnam (54%), Iran (16%) and Malaysia (12%). The new version leverages the EternalBlue exploit to spread, experts observed that the threat also updates existing NRSMiner installs. ETERNALBLUE is an NSA exploit that made the headlines […]

Pierluigi Paganini January 04, 2019
Hackers leak data on hundreds of German Politicians, including Chancellor Merkel

German politicians were impacted by a massive data leak that exposed their personal data online, German Chancellor Angela Merkel was affected too. Data belonging to hundreds of German politicians, including Chancellor Angela Merkel, were exposed online due to a massive leak that is the biggest data dump of its kind in the country. According to […]

Pierluigi Paganini January 04, 2019
Town of Salem RP Game hacked, more than 7.6M Players affected

BlankMediaGames disclosed a data breach that affects millions of players of the popular role-playing game Town of Salem. The BlankMediaGames suffered a data breach that impacted more than 7.6 million players of the browser-based role-playing game Town of Salem Exposed data includes usernames, emails, passwords, IP addresses, game and forum activity. The bad news for […]

Pierluigi Paganini January 03, 2019
Adobe addressed two critical flaws in Adobe Acrobat, Reader

The first Adobe security updates for 2019 addresses two critical vulnerabilities in the Acrobat and Reader products. Adobe addressed two critical vulnerabilities in the Acrobat and Reader products, a use-after-free issue and a security bypass flaw. The flaws affect the latest versions of Acrobat DC, Acrobat Reader DC, Acrobat 2017 and Acrobat Reader DC 2017 for Windows […]

Pierluigi Paganini January 03, 2019
Hackers defaced Dublin Luas website and demand ransom

The website of the tram system in Dublin, the Luas, was hacked on Thursday, attackers claim to have the access to information stored on the organization’s systems. Attackers defaced the website of the Luas, the home page displayed a message demanding the payment of 1 bitcoin. The hackers asked the payment within 5 days threatening to “publish all data and send emails […]

Pierluigi Paganini January 03, 2019
After 3 years, Google partially fixes a bug in Android Google Chrome

Three years after its disclosure, Google has patched an information disclosure flaw in the Android version of the popular Chrome web browser. The issue exposes devices information, including device model and firmware version, an attacker could exploit this info to remotely identify unpatched devices and target them. The flaw ties the way the Android version […]

Pierluigi Paganini January 03, 2019
New unCaptcha automated system bypasses Google reCAPTCHA once again

The unCaptcha automated system can once again bypass Google’s reCAPTCHA challenges, despite major updates to the security service. It has happened again, the unCaptcha automated system is able to bypass the Google reCAPTCHA mechanism even if it was improved over the years. The unCaptcha system was created in 2017 to bypass the reCAPTCHA mechanism used to protect websites […]

Pierluigi Paganini January 02, 2019
Cloud Hosting Provider DataResolution.net hit by the Ryuk ransomware

The Cloud hosting provider Dataresolution.net was hit by a ransomware-based attack on Christmas Eve that took down its systems. Data Resolution LLC provides software hosting, business continuity systems, cloud computing, and data center services to more serves than 30,000 businesses worldwide, The news was first reported by the popular investigator Brian Krebs on KrebsOnSecurity, the company believe […]

Pierluigi Paganini January 02, 2019
wget utility potential leaked password via extended filesystem attributes

Developers that include the GNU’s wget utility in their applications have to use the new version that was released on Boxing Day. GNU Wget is a free software package for retrieving files using HTTP, HTTPS, FTP and FTPS the most widely-used Internet protocols. It is a non-interactive commandline tool, so it may easily be called from […]

  • 1
  • 2
  • ...
  • 962
  • 963
  • 964
  • 965
  • 966
  • ...
  • 1513
  • 1514
  • 1515

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Microsoft unveils Project Ire: AI that autonomously detects malware

    Malware / August 07, 2025

    CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

    APT / August 07, 2025

    Over 100 Dell models exposed to critical ControlVault3 firmware bugs

    Hacking / August 07, 2025

    How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments

    Security / August 07, 2025

    WhatsApp cracks down on 6.8M scam accounts in global takedown

    Cyber Crime / August 06, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT