• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

 | 

Interlock ransomware group deploys new PHP-based RAT via FileFix

 | 

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Cyber Crime

Pierluigi Paganini July 22, 2015
Business Blackout, economic impact of a cyber attack against a power grid

What will happen if hackers will hit critical infrastructure in the US, which will be the economic impact of a cyber attack against a power grid? According to a poll done by Morning Consult firm, cyber attacks are just behind terrorism attacks on the list of biggest threats to the US, it has been estimated that the […]

Pierluigi Paganini July 22, 2015
Deep dive into attribution trove of Hacking Team

Thi post was written by the security experts and colleagues at RedSocks, they explored the argument of the “Attribution” for the Hacking Team data Breach. Attribution is probably one of the toughest things to deal with during a major Cyber Security breach, yet it is one of the most demanded skills.Earlier in the first incident […]

Pierluigi Paganini July 20, 2015
Cheating site Ashley Madison hacked, 37 million users at risk

Nearly 37 million users of the cheating site Ashley Madison are at risk of having their data leaked online, including financial info and sexual fantasies. The popular online cheating site Ashley Madison has been hacked, and a big amounts of data was stolen by hackers who posted part of this information online as proof of […]

Pierluigi Paganini July 20, 2015
Phishing campaigns target US government agencies exploiting Hacking Team flaw CVE-2015-5119

A recent FBI memo warns phishing attacks targeted government agencies trying to exploit the CVE-2015-5119 vulnerability linked to Hacking Team data breach. According to an FBI warning, hackers have targeted US Government agencies using a recently patched Adobe Flash vulnerability (CVE-2015-5119). The Adobe Flash vulnerability was one of the flaws discovered by analyzing the 400Gb archive […]

Pierluigi Paganini July 19, 2015
Dead NIS agent left note denying spying on SK population

South Korean police has found a NIS agent that left a note denying massive surveillance operated by the Government of Seoul on the population. The New York Times reported that a 46-year-old NIS agent working for the South Korean government was found dead in an apparent suicide. The man left a note denying National Intelligence […]

Pierluigi Paganini July 19, 2015
Security Affairs newsletter Round 18 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. A new Zero-Day Vulnerability arises from Hacking Team hack Hacking Team Another Flash Zero-Day: CVE-2015-5122 Hacking Team by Numbers – The Infographic Hacking Team chief: Were the GOOD GUYS […]

Pierluigi Paganini July 19, 2015
Russian APT launched a new phishing campaign on the Pentagon

A sophisticated APT group who targeted the White House and State Department, have launched a new stealth spear phishing campaign on the Pentagon. The Daily Beast has revealed that he got the proof that the White House and State Department were hacked by a sophisticated Russian APT. The newspaper that published the news in exclusive has run […]

Pierluigi Paganini July 18, 2015
iOS crash warnings scam targeted iPhone and iPad users in US and UK

According to a report published by The Telegraph, scammers are targeting iPhone and iPad users with a new elaborate scheme that relies on iOS crash warnings Scammers are targeting iPhone and iPad users with a new-old elaborate scheme that relies on iOS crash warnings. Scammers are using JavaScript generated dialogs to display IOS Crash warnings, as explained […]

Pierluigi Paganini July 18, 2015
UCLA Health hospitals confirmed data breach that involved 4.5 million records

The California UCLA Health hospitals announced that have breached its systems and accessed personal information and medical records of 4.5 million patients. The California UCLA Health hospitals announced that hackers may have breached its systems and accessed personal information and medical records of 4.5 million patients. The UCLA Health medical group reported that hackers infiltrated […]

Pierluigi Paganini July 17, 2015
Many Android and Apple Apps allow brute force attacks

According to a recent research published by experts at the AppBugs firm many Android and Apple mobile apps allow brute force attacks. Android and Apple devices are the most used worldwide, millions of mobile users every day use the apps available in their official stores, but what if the majority of these applications are vulnerable […]

  • 1
  • 2
  • ...
  • 497
  • 498
  • 499
  • 500
  • 501
  • ...
  • 598
  • 599
  • 600

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

    Hacking / July 15, 2025

    Interlock ransomware group deploys new PHP-based RAT via FileFix

    Cyber Crime / July 14, 2025

    Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

    Data Breach / July 14, 2025

    Experts uncover critical flaws in Kigen eSIM technology affecting billions

    Security / July 14, 2025

    Spain awarded €12.3 million in contracts to Huawei

    Intelligence / July 14, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT