• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

FBI seized multiple piracy sites distributing pirated video games

 | 

An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

 | 

Interlock ransomware group deploys new PHP-based RAT via FileFix

 | 

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Cyber Crime

Pierluigi Paganini October 20, 2013
Original fishing scheme against Poste Italiane

Security Experts at Sophos have detected a new phishing campaign against the Italian brand Poste Italiane that makes use of an efficient social engineering technique. Sophos experts detected this week an intriguing case of phishing against the Italian postal service Poste Italiane, the scheme attracted the researcher’s attention due the reuse of an old social […]

Pierluigi Paganini October 20, 2013
Syrian Electronic Army attacked most major Qatar websites

Syrian Electronic Army attacked most major Qatar websites to protest against the support of the government to the rebels against Assad. The Syrian Electronic Army (SEA) has hit a new series of targets in a large hacking campaign against high profile Qatar based websites. The Syrian Electronic Army is considered one of the most active and dangerous group of […]

Pierluigi Paganini October 18, 2013
Arbor Networks has published ATLAS Q3 2013 DDoS report

Arbor Networks has published a quarterly report based on data pulled from ATLAS which includes new insight into DDoS attack trends having worrying characteristics. Arbor Networks has issued the report on global DDoS attack trends for the first three quarters of 2013, the report revealed that this kind of attack still represents a serious menace for IT […]

Pierluigi Paganini October 17, 2013
A vBulletin exploit used to hack thousands of websites

Security firm Imperva revealed that more than 35000 websites based on vBulletin CMS have been hacked exploiting a known vulnerability. Security experts warn of a massive attack against web sites that exploits  security flaw sites powered by the forum software vBulletin. On August vBullettin authors warned on “Potential vBulletin Exploit (vBulletin 4.1+, vBulletin 5+)”. The exploits […]

Pierluigi Paganini October 11, 2013
Ponemon Institute issued the 2013 Cost of Cyber Crime Study

HP sponsored a study of Ponemon Institute that reveals Cost of Cybercrime in 2013 escalates 78 Percent while Time to Resolve Attacks More Than Doubles. HP and the Ponemon Institute have published The 2013 Cost of Cyber Crime Study, the fourth annual report that provides an estimation of the economic impact of cybercrime. “Information is a powerful […]

Pierluigi Paganini October 10, 2013
Blackhole author arrested. The impact on the underground market

The author of the Blackhole exploits kit has been arrested after a long investigation. What will change in the offer of the criminal underground? The author of the popular Blackhole exploit kit, also know as Paunch, has been arrested. The cybercrime underground has lost one of its principal actors considering that the malicious kit is one of […]

Pierluigi Paganini October 09, 2013
2013 Norton Report, the impact of cybercrime according Symantec

Symantec issued 2013 Norton Report, the annual research study which examines the consumers’ online behaviors, the dangers and financial cost of cybercrime. Symantec has released the 2013 Norton Report, the annual study of evolution of principal cyber threats in the security landscape. The study presented concerning results on the constant growth of cyber criminal activities. The 2013 […]

Pierluigi Paganini October 08, 2013
How to exploit iFramed based traffic E-shop for illegal activities

What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible Dancho Danchev I’ll try to answer to these questions. On numerous occasion I remarked the need to carefully observe the evolution of the underground market to identify dangerous trends that can leave portend a new wave of […]

Pierluigi Paganini October 05, 2013
Reading IBM X-Force 2013 Mid-Year Trend and Risk Report

IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on main cyber threats and information on mitigation techniques. IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a study that identifies Social media as the main target of cyber criminal activities. The powerful social networking […]

Pierluigi Paganini October 04, 2013
Adobe security breach,hackers steal 2.9M accounts and source code

Adobe reveals customer data stolen in security breach, hackers have accessed sensitive information for 2.9 million users and to the source code of many products. Adobe Systems Inc has warned that customer data stolen in a security breach. According an official advisory, 2.9 million customers might have had their information stolen due a cyber attack that hit […]

  • 1
  • 2
  • ...
  • 571
  • 572
  • 573
  • 574
  • 575
  • ...
  • 598
  • 599
  • 600

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    FBI seized multiple piracy sites distributing pirated video games

    Cyber Crime / July 15, 2025

    An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

    Hacking / July 15, 2025

    Interlock ransomware group deploys new PHP-based RAT via FileFix

    Cyber Crime / July 14, 2025

    Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

    Data Breach / July 14, 2025

    Experts uncover critical flaws in Kigen eSIM technology affecting billions

    Security / July 14, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT