• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 

Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom

 | 

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

 | 

Columbia University data breach impacted 868,969 people

 | 

SonicWall dismisses zero-day fears after Ransomware probe

 | 

Air France and KLM disclosed data breaches following the hack of a third-party platform

 | 

CISA, Microsoft warn of critical Exchange hybrid flaw CVE-2025-53786

 | 

Microsoft unveils Project Ire: AI that autonomously detects malware

 | 

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

 | 

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

 | 

How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments

 | 

WhatsApp cracks down on 6.8M scam accounts in global takedown

 | 

Trend Micro fixes two actively exploited Apex One RCE flaws

 | 

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

 | 

Google fixed two Qualcomm bugs that were actively exploited in the wild

 | 

Zero Day Quest returns: Microsoft ups the stakes with $5M bug bounty

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Cyber Crime

Pierluigi Paganini May 20, 2013
WSIS Forum 2013 – Securing Cyberspace in a borderless world

“Securing Cyberspace in a borderless world: Vision 2015 and Beyond” is the title of a High Level Dialogue that was held during The World Summit on the Information Society Forum (WSIS) 2013. The World Summit on the Information Society Forum (WSIS) represents the world’s largest annual gathering of the ICT for development  community, the event is organized […]

Pierluigi Paganini May 19, 2013
Yahoo Japan suspects 22 million user IDs stolen

Yahoo Japan Corp is investigating on a possible data breach that may have exposed 22 million user IDs stolen during an unauthorized access to web portal. Yahoo Japan Corp is investigating on a possible data breach that exposed the user IDs of 22 million accounts, another shocking event that raise the necessity to improve security […]

Pierluigi Paganini May 17, 2013
Group-IB Exclusive details on Kangoo botnet that hit Australian banks

Group-IB researchers have detected a new botnet named Kangoo that infected more than 150 000 machines mainly targeting Australian banks. Group-IB researchers have detected a new botnet named Kangoo that infected more than 150 000 machines, specialists dubbed it «Kangoo» due the presence of  a kangaroo logo on the WEB-interface of the C&C administrative panel. The botnet mainly […]

Pierluigi Paganini May 14, 2013
New trends in the underground market, the offer of cybercrime

The monitoring of the criminal underground is essential to understand the dynamics of cybercrime and related offer on the black market. At fixed intervals I decided to take a look at what is happening in the underground black market analyzing how evolves its offer and the related sales models. In the last months it has been […]

Pierluigi Paganini May 11, 2013
Bank robbery. Global Network of cyber criminals stole $45m from ATMs

The biggest Bank robbery realized by a gang of hackers, a global network of cyber criminals operating in 26 countries stole $45 million hacking into a database of prepaid debit cards. The news on the biggest bank robbery with a cyber attack against ATMs in the history is conquering the Network, US law enforcement has […]

Pierluigi Paganini May 08, 2013
OpUSA, Anonymous against US Banking and Government offices

OpUSA campaing is officially started, the day has come, today May 7 as announced by Anonymous, a coordinated online attack will hit Banking and government websites. OpUSA campaing is officially started, the day has come, today May 7th as announced by Anonymous, a coordinated online attack against will hit banking and government websites. The announcement made by popular group of hacktivists is creating great […]

Pierluigi Paganini May 07, 2013
Hacking with new DIY Google Dorks based hacking tool

A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for reconnaissance of targets. A Webroot blog post announced that a new version of DIY Google Dorks based hacking tool has been released in the wild and it could be used for mass website analysis, the […]

Pierluigi Paganini May 06, 2013
APWG Mobile Financial Fraud report & mobile black market

APWG published the interesting study APWG Mobile Financial Fraud report on the underground marketplace that revealed the explosion of prolific mobile fraud malware market. The APWG Mobile Financial Fraud report resumed The Anti-Phishing Mobile Working Group investigating on the expansion of the black market for mobile malicious code, the study is crucial to understand the evolution of criminal activities […]

Pierluigi Paganini May 04, 2013
DDoS – Evolution of DIY tools in the underground

When the DDoS topic is introduced it’s immediate to link it with the most popular tools usable for this type of attacks, but underground offers much more. When the DDoS topic is introduced it’s immediate to link it with the most popular tools usable for this type of attacks such as the popular LOIC, we must consider that underground offer […]

Pierluigi Paganini May 02, 2013
ESET on Avatar rootkit with API, SDK, and Yahoo Groups as C&C

ESET security firm found a mysterious instance of Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication Early this year ESET security firm detected the Avatar rootkit (Win32/Rootkit.Avatar), a mysterious malware advertised  as rootkit by Russian cybercrime on specific forums. “We present you here previously announced product. In connection with work on other projects, […]

  • 1
  • 2
  • ...
  • 581
  • 582
  • 583
  • 584
  • 585
  • ...
  • 601
  • 602
  • 603

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Google confirms Salesforce CRM breach, faces extortion threat

    Data Breach / August 10, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

    Breaking News / August 10, 2025

    Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / August 10, 2025

    Embargo Ransomware nets $34.2M in crypto since April 2024

    Cyber Crime / August 09, 2025

    Germany limits police spyware use to serious crimes

    Laws and regulations / August 09, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT