• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Android Malware Konfety evolves with ZIP manipulation and dynamic loading

 | 

Belk hit by May cyberattack: DragonForce stole 150GB of data

 | 

North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

 | 

FBI seized multiple piracy sites distributing pirated video games

 | 

An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

 | 

Interlock ransomware group deploys new PHP-based RAT via FileFix

 | 

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Cyber Crime

Pierluigi Paganini January 08, 2015
New Emotet spam campaign targets German users

Security experts at Microsoft detected a new variant in the Win32/Emotet family which is targeting German users with a new spam email campaign. Researchers from Microsoft have uncovered a new criminal campaign is targeting German users with a new variant of a sophisticated banking malware, Trojan:Win32/Emotet.C. The attackers are running Spam email campaign in Germany to serve a […]

Pierluigi Paganini January 08, 2015
Hacking an ATM with a Samsung Galaxy 4 Smartphone

Hackers hit ATM systems forcing them to dispense the cash stored in their money cases relying on certain commands sent through a smartphone. Cybercriminals can hack ATM systems and force it to dispense the cash using a smartphone, in the specific case a Samsung Galaxy 4 phone. The model of smartphone is not important, the […]

Pierluigi Paganini January 07, 2015
Malvertising, HuffingtonPost was serving Malware via AOL Ad-Network

Security company Cyphort has discovered a malvertising campaign that targeted several websites via AOL Ad-Network, including the Huffington Post. Security experts at Cyphort firm discovered a new malvertising campaign that hit numerous websites, including the Huffington Post and LA Weekly. The attackers exploited the AOL ad network to run the malicious campaign, Cyphort detected the attacks for the first […]

Pierluigi Paganini January 06, 2015
Hackers have stolen $5 million to Bitstamp Bitcoin exchange

The UK-based Bitcoin exchange Bitstamp has temporarily suspended its service in the wake of a major cyber attack against company online systems. The UK-based Bitcoin exchange Bitstamp has temporarily suspended its service in wake of compromise. Bitstamp announced that its systems suffered a major cyber attack, which lead to the theft of “less than 19,000 BTC”. “We have […]

Pierluigi Paganini January 05, 2015
Microsoft observed a significant increase in macros based malware

The Microsoft Malware Protection Center (MMPC) has recently observed a surge in the infections of malware using macros to spread their malicious code. The Microsoft Malware Protection Center (MMPC) is warning Office users on the diffusion of malicious macros through email attachments or social engineering websites. A macro is a series of commands and instructions that […]

Pierluigi Paganini January 05, 2015
Several Electronic Arts Origin accounts hacked

Many gamers are finding purchases that they never made their accounts for Electronic Arts Origin service. Once again the gaming industry under attack. There is no peace for the companies operating in the gaming industry. During Christmas holidays, the hackers of Lizard Squad brought down the PSN and Xbox live services, while yesterday the hacking […]

Pierluigi Paganini January 04, 2015
CYBERPOL PUBLISHES THE FIRST INTERNATIONAL CYBERBOK BODY OF KNOWLEDGE ON CYBER CRIME RISK MANAGEMENT

CYBERPOL PUBLISHES THE FIRST INTERNATIONAL CYBERBOK BODY OF KNOWLEDGE ON CYBER CRIME RISK MANAGEMENT. The cyber crime body of knowledge is the application of risk management to cyber crime context in order to manage virtual space risk and vulnerabilities, i.e.: The business risk associated with the use of: cyber space, cybernet, e-cyber operation, virtual space […]

Pierluigi Paganini January 04, 2015
Cybercrime, a dangerous and attractive lifestyle for young cyber talents

Cybercrime is a dangerous and attractive lifestyle for young cyber talents. Which are the strengths of a winning model that is hard to fight? The Director of the European police agency Europol, Rob Wainwright, has provided illuminating details on the evolution of the cyber criminal ecosystem. The number of cyber crimes is growing rapidly, their level […]

Pierluigi Paganini January 02, 2015
83 Percent of Tor hidden service traffic flowed to Pedo websites. Study finds.

A recent study conducted by researchers at the University of Portsmouth revealed that over 80 Percent of Tor network visits is related to pedo sites. In the last couple of years a growing number of security experts are focusing their research on Darknet, a portion of the Deep Web often used by the criminal underground to […]

Pierluigi Paganini January 01, 2015
UK police arrested alleged Lizard Squad member

A member of the Lizard Squad hacking group that shutdown the Play Station Network and the Xbox live service networks has been arrested by the UK police. In these days, we have followed the news related to hacking team known as the Lizard Squad who became famous for having ruined Christmas for millions of users of PSN […]

  • 1
  • 2
  • ...
  • 529
  • 530
  • 531
  • 532
  • 533
  • ...
  • 598
  • 599
  • 600

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Android Malware Konfety evolves with ZIP manipulation and dynamic loading

    Malware / July 15, 2025

    Belk hit by May cyberattack: DragonForce stole 150GB of data

    Data Breach / July 15, 2025

    North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

    Hacking / July 15, 2025

    FBI seized multiple piracy sites distributing pirated video games

    Cyber Crime / July 15, 2025

    An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

    Hacking / July 15, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT