• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Android Malware Konfety evolves with ZIP manipulation and dynamic loading

 | 

Belk hit by May cyberattack: DragonForce stole 150GB of data

 | 

North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

 | 

FBI seized multiple piracy sites distributing pirated video games

 | 

An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

 | 

Interlock ransomware group deploys new PHP-based RAT via FileFix

 | 

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Cyber Crime

Pierluigi Paganini February 04, 2015
Android adware infected more than 15 millions users via Play store

Security experts at Avast have discovered three malicious Android apps that were serving Adware, more than 15 million users infected via Play store. Adware is one of the most insidious threat to the mobile platform, this family of malicious code is used by threat actors to automatically display or downloads advertising material when a user […]

Pierluigi Paganini February 04, 2015
Experts uncovered a massive CTB-Locker ransowmare campaign

Security researchers at the CERT team at Société Générale uncovered a new malware campaign which is spreading the CTB-Locker or Critroni crypto ransomware. Security experts at the CERT team at Société Générale discovered a new malware campaign delivering the CTB-Locker or Critroni crypto ransomware. In the past, the criminals used the popular Angler exploit kit in order […]

Pierluigi Paganini February 03, 2015
Target Hackers Hit Third Parking Service

Criminal crew behind Target and Home Depot data breaches is now targeting online parking reservation services, Book2park is the third victim since December. The hacking crew hackers behind the data breaches of the retail chain Target and Home Depot are now threatening parking lots according to the recent report published by the popular investigator Brian Krebs. […]

Pierluigi Paganini February 03, 2015
Cybercrime – UNICRI study analyzed risks for the economy and enterprises

UNICRI published a study on the impact of the cybercrime on the economy in the Europen region with a specific focus on the effect suffered by enterprises. The UNICRI has recently published a study titled “Cybercrime and the risks for the economy and enterprises at the European Union and Italian level” that analyzed the impact of […]

Pierluigi Paganini February 02, 2015
A third Flash Zero-Day is being exploited in the wild

A third critical zero-day vulnerability affects Adobe Flash Player 16.0.0.296 and earlier versions for Windows, Linux and Mac. It is the third time in a few weeks that the security of Adobe users is menaced by a zero-day in Flash that affects Windows, Linux and OS X systems. The company is already working to provide a patch […]

Pierluigi Paganini February 02, 2015
Hackers stole GigaBytes of Syrian opposition’s data, including battle plans

A report issued by FireEye revealed that hackers have stolen GigaBytes of data from Syrian opposition’s computers, including battlefield plans. A recent report issued by FireEye revealed that hackers tapped into Syrian opposition’s computers and have stolen gigabytes of secret communications and battlefield plans. In mid-2013, ten armed units belonging to the opposition to the Syrian Government were […]

Pierluigi Paganini February 02, 2015
The Pirate Bay back online … with many doubts

The Pirate Bay is online again, but many shadows obfuscate its rebirth. Angry staff members promise to open the full site back on a separate domain. The torrent-indexing website Pirate Bay has risen again after almost two months of total outage. The Pirate Bay it the most popular file-sharing website used to share copyrighted material free of charge, last year it […]

Pierluigi Paganini February 01, 2015
IC3 and FBI warn about Business Email Compromise aka Wire Payment Scam

IC3 and FBI warn about a significant increase of cases related to Business Email Compromise, nearly 2,000 individuals were victims of a wire payment scam. According to an online statement from the Internet Crime Complaint Center (IC3) and the FBI, nearly 2,000 individuals were victims of a wire payment scam that was extended to 45 countries and […]

Pierluigi Paganini January 30, 2015
News Zeus shows significant a evolution in the criminal ecosystem

Researchers at SentinelOne have discovered a strain of the Zeus malware that includes a very sophisticated control panel and evasion techniques. Malware researchers at SentinelOne  have spotted a new Zeus variant that was used to target major Canadian banks, including the National Bank of Canada, the Bank of Montreal and the Royal Bank of Canada. […]

Pierluigi Paganini January 29, 2015
ZeroAccess botnet ‘reloaded’ again with click-fraud activity

The Dell SecureWorks Counter Threat Unit (CTU) research team observed the ZeroAccess botnet resumes again with click-fraud activity. Law enforcement has destroyed the ZeroAccess botnet, also known as Sirefef, in December 2013 by a joint effort of Microsoft Digital Crimes Unit, FBI, Europol and industry partners. The ZeroAccess botnet is considered one of most insidious malicious […]

  • 1
  • 2
  • ...
  • 525
  • 526
  • 527
  • 528
  • 529
  • ...
  • 598
  • 599
  • 600

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Android Malware Konfety evolves with ZIP manipulation and dynamic loading

    Malware / July 15, 2025

    Belk hit by May cyberattack: DragonForce stole 150GB of data

    Data Breach / July 15, 2025

    North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

    Hacking / July 15, 2025

    FBI seized multiple piracy sites distributing pirated video games

    Cyber Crime / July 15, 2025

    An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

    Hacking / July 15, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT