• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 

A ransomware attack pushed the German napkin firm Fasana into insolvency

 | 

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

 | 

China-linked group Salt Typhoon breached satellite firm Viasat

 | 

Iran experienced a near-total national internet blackout

 | 

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

 | 

Healthcare services company Episource data breach impacts 5.4 Million people

 | 

Watch out, Veeam fixed a new critical bug in Backup & Replication product

 | 

U.S. CISA adds Linux Kernel flaw to its Known Exploited Vulnerabilities catalog

 | 

News Flodrix botnet targets vulnerable Langflow servers

 | 

U.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Cyber Crime

Pierluigi Paganini December 11, 2014
Mac OS X is no longer immune, reveals Kaspersky’s 2014 Malware countdown

Apple’s Mac OS X is no longer immune to malware and bugs says Kaspersky Security Lab.A survey of 2014 reveals that more malware attacks targeted Mac. For years, Mac OS X has been flaunted as the most immune OS to malwares and bugs. Well, the reign of Mac might end in 2014, with users’ on […]

Pierluigi Paganini December 11, 2014
Are CloudAtlas and RedOctober campaigns managed by same APT?

Kaspersky Lab suspects that the bad actor who is managing a new campaign dubbed CloudAtlas is the same that run the Operation Red October two years ago. Red October is the name of a cyber espionage campaign discovered by security experts at Kaspersky Lab in late 2012 and disclosed in January 2013. The threat actors behind the […]

Pierluigi Paganini December 10, 2014
Hackers leak scripts, celebrity phones and aliases at Sony Pictures Entertainment

GOP released a new archive of Sony Pictures Entertainment confidential data including private information of employees, celebrity phone numbers, film scripts and many more. The Sony Pictures data breach is becoming a never ending history, the GOP is leaking company data and much more since the attack while security firms are providing the details of their […]

Pierluigi Paganini December 10, 2014
Stolen Sony certificates used to digitally sign Destover Malware

Security experts at Kaspersky Lab have detected a strain of Destover Malware that has been digitally signed with the certificates stolen during Sony attack. Security experts have detected a new strain of the Destover malware that was used in the recent Sony Pictures Entertainment breaches characterized by a singular feature, the sample is signed by […]

Pierluigi Paganini December 08, 2014
Lizard Squad launches DDoS attack also on PlayStation network

Lizard Squad claims to have hacked also Sony PlayStation Network that suffered a DDoS attack. A week ago the hacking team known as the Lizard Squad brought down the Xbox Live online service with a DDoS attack. Microsoft users were not able to access the online platform for several hours, the service has several problems […]

Pierluigi Paganini December 08, 2014
Italy is within most targeted countries by Crypto-Ransomware in EMEA Region

Trend Micro has analyzed the diffusion of Crypto-Ransomware in the EMEA Region, such attacks are very effective and Italy is in the Top infected countries. The holiday season is the period of the year in which cybercrime appears more active because it is advantaged by a fervid online activity of the Internet users. This is the period of the […]

Pierluigi Paganini December 08, 2014
Xbox Live service down again due to a new DDoS attack by the Lizard Squad

Xbox Live online service was not available for the second time in a few days due to a new DDoS attack by the Lizard Squad hacking team. Just a week ago the hacking team Lizard Squad has hit the Xbox Live service with a DDoS attack that caused its interruption.  The Microsoft’s Xbox Live servers were not […]

Pierluigi Paganini December 07, 2014
The wiper malware that hit Sony Picture was written in Korean

Security experts at AlienVault discovered further elements of the wiper malware used for the attack on Sony Pictures that link it to North Korean hackers. New evidence has emerged from the investigation on the clamorous cyber attack against the Sony Pictures, experts at Alien Vault provided further elements to link the attack to the North Korea. Last […]

Pierluigi Paganini December 07, 2014
GOP sent threatening emails to Sony Pictures Employees

Hackers behind the major attack against the Sony Pictures Entertainment hit again the company by sending threatening emails to its employees. The massive cybar attack that compromised the corporate computer network at Sony Pictures Entertainment is having a serious impact on the organization and its employees. The GOP crew, aka the Guardians of Peace, that hacked Sony Picture accessed a huge […]

Pierluigi Paganini December 06, 2014
Treasury Dept report confirms Tor network abuse in financial crimes

A non-public report realized by the US Treasury Department found that a majority of bank account takeovers exploits the anonymizing the Tor network. A report from the U.S. Treasury Department found that a majority of bank account takeovers by cyber criminals, affected organizations over the past decade, exploited the anonymizing Tor network. The news is shared by the […]

  • 1
  • 2
  • ...
  • 530
  • 531
  • 532
  • 533
  • 534
  • ...
  • 596
  • 597
  • 598

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    McLaren Health Care data breach impacted over 743,000 people

    Data Breach / June 23, 2025

    American steel giant Nucor confirms data breach in May attack

    Data Breach / June 23, 2025

    The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

    Cyber Crime / June 23, 2025

    Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

    Cyber warfare / June 23, 2025

    Qilin ransomware gang now offers a "Call Lawyer" feature to pressure victims

    Breaking News / June 22, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT