• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog

 | 

Android Malware Konfety evolves with ZIP manipulation and dynamic loading

 | 

Belk hit by May cyberattack: DragonForce stole 150GB of data

 | 

North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

 | 

FBI seized multiple piracy sites distributing pirated video games

 | 

An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

 | 

Interlock ransomware group deploys new PHP-based RAT via FileFix

 | 

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Cyber Crime

Pierluigi Paganini November 02, 2013
Cyberbullying Infograph – know to fight it

The post is an intro to Cyberbullying concept and proposes an interesting infograph to better understand the entity of the forms of cyber harassment. Cyberbullying is the use of the Internet and any other technology to harm or harass other people, in a deliberate, repeated, and hostile manner.  Unfortunately this phenomena are in constant increase, in […]

Pierluigi Paganini November 02, 2013
Finland’s Ministry of Foreign Affairs hit by extensive cyber espionage

Finland’s foreign minister announced that foreign intelligence agents had carried out large-scale cyber espionage into government communications. The Finnish Ministry of Foreign Affair networks has been targeted in a cyber espionage operation lasting at least four years, the news has been reported by the Finnish commercial broadcaster MTV3. Finland’s foreign minister Erkki Tuomioja confirmed the shocking news, a large […]

Pierluigi Paganini November 01, 2013
Anonymous OpNSA Campaign – OSINT to predict DDoS attacks on Nov 5th

  OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a forecast on next attacks. Web Intelligence analysis alerts on early signs of an Anonymous cyber campaign dubbed OpNSA that as usual will address with DDoS attack principal US Government websites. Security experts don’t exclude the […]

Pierluigi Paganini November 01, 2013
I don’t like – Facebook Clickjacking and track screen cursors

A misleading script to increase the number of “I like” and an invasive technology to track screen cursors are threatening the Facebook users. The social media are money machines, the interest of private companies, governments and cybercrime are increasing exponentially. Security experts are observing an alarming trend, a growing number of subjects are spending a […]

Pierluigi Paganini October 31, 2013
Prolexic on the Distributed Reflection Denial of Service attacks

Prolexic DDoS Attack Report reveals an increasing interest of cybercrime in Distributed Reflection Denial of Service technique, efficient and cost-effective. Prolexic Quarterly Global DDoS Attack Report revealed an increasing interest of cybercrime in Distributed Reflection Denial of Service technique (DNS reflection DDoS attack aka or DrDoS) and for this reason the company specialized in DDoS […]

Pierluigi Paganini October 29, 2013
Social media and digital identity. Prevention and incident response

The hack of a social media account is a common incident that could have a serious impact of our digital identity. How to prevent it? What to do in case of hack? Social media, cloud computing and mobile are technologies that most of all attract cybercriminals due their high penetration, exploiting this channels attackers could […]

Pierluigi Paganini October 28, 2013
Syrian Electronic Army hacked President Obama website and social media

Syrian Electronic Army Targeted President Obama’s website, Twitter and Facebook accounts and email account linked to his non-profit activities. Once again Syrian Electronic Army, the pro-Assad group claims it has hacked the President Barack Obama’s website, the social media accounts belonging to him on Twitter and Facebook and it violated the email accounts linked to […]

Pierluigi Paganini October 28, 2013
Israel – AP Exclusive reveals tunnel hit by cyber attack

Cybersecurity experts revealed that a major artery in Israel’s national road network located in the northern the city of Haifa suffered a cyber attack. Israel is considered one of the most advanced country in cyber security, but at the same time is a privileged target for hostile governments intent in sabotage and cyber espionage on […]

Pierluigi Paganini October 27, 2013
Subcontractors are for hackers the weakest link in security chain

Hackers use to target subcontractors to hit big enterprises due the poor level of security they offer, in the energy sector this trend is very concerning. Let’s follow the discussion on the hacking world and the way hackers impact business with their activities. We discussed about the role of hackers for companies and their employment […]

Pierluigi Paganini October 26, 2013
PHP.net compromised and redirecting to Magnitude exploit kit

Google detected a malware on PHP.net website, the internal team confirmed that the website was compromised and redirecting to a Magnitude exploit kit. php.net website was serving malware, the alert was launched by Google’s Safe Browsing service that alerted internet users.  Subsequent investigation confirmed that some of the project’s servers did get compromised, attackers succeeded to infect […]

  • 1
  • 2
  • ...
  • 570
  • 571
  • 572
  • 573
  • 574
  • ...
  • 598
  • 599
  • 600

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog

    Hacking / July 16, 2025

    Android Malware Konfety evolves with ZIP manipulation and dynamic loading

    Malware / July 15, 2025

    Belk hit by May cyberattack: DragonForce stole 150GB of data

    Data Breach / July 15, 2025

    North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

    Hacking / July 15, 2025

    FBI seized multiple piracy sites distributing pirated video games

    Cyber Crime / July 15, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT