• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 

Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

 | 

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

 | 

U.S. CISA urges to immediately patch Microsoft SharePoint flaw adding it to its Known Exploited Vulnerabilities catalog

 | 

Microsoft issues emergency patches for SharePoint zero-days exploited in "ToolShell" attacks

 | 

SharePoint zero-day CVE-2025-53770 actively exploited in the wild

 | 

Singapore warns China-linked group UNC3886 targets its critical infrastructure

 | 

U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 54

 | 

Security Affairs newsletter Round 533 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Radiology Associates of Richmond data breach impacts 1.4 million people

 | 

Fortinet FortiWeb flaw CVE-2025-25257 exploited hours after PoC release

 | 

Authorities released free decryptor for Phobos and 8base ransomware

 | 

Anne Arundel Dermatology data breach impacts 1.9 million people

 | 

LameHug: first AI-Powered malware linked to Russia’s APT28

 | 

5 Features Every AI-Powered SOC Platform Needs in 2025

 | 

Broadcom patches critical VMware flaws exploited at Pwn2Own Berlin 2025

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Hacking

Pierluigi Paganini September 14, 2015
Department of Energy hacked 159 times between 2010 and 2014

According to a review of federal records obtained by USA Today, the US Department of Energy is among the most targeted government organizations in the US. The US Department of Energy manages information of strategic importance for a potential attacker, it oversees the operations of power grid, nuclear arsenal, and national labs. The data show that the […]

Pierluigi Paganini September 14, 2015
Are you using a smartwatch? Hackers could get your data

Researchers have created an app that follows the micro-movements of your smartwatch and are able to detect what keys you’re pressing with your left hand and thus guess what words you may be typing on a keyboard. A group of students lead by Romit Roy Choudhury, Associate Professor at ECE Illinois developed a mobile app […]

Pierluigi Paganini September 12, 2015
ISIS hackers violated top secret British Government emails

According to an investigation by the GCHQ intelligence agency ISIS hackers targeted information held by some of David Cameron’s most senior ministers. According the experts at the British Intelligence GCHQ, ISIS hackers intercept top secret British Government emails. The investigation conducted by the GCHQ allowed the British intelligence to uncover a serious breach, terrorists linked […]

Pierluigi Paganini September 12, 2015
TSA master keys 3D blueprints for Luggage Locks Leaked Online

On gitHub there are available for download the blueprints for the TSA master keys, every lock which is ‘TSA recognized’ is at risk. In November 2014, The Washington Post published a story  about “the secret life of baggage” showing the secret work the Transportation Security Administration officers. The article was only briefly accompanied by a photo […]

Pierluigi Paganini September 12, 2015
Zimperium firm released the Android Stagefright Exploit Code

Zimperium firm released the Android Stagefright Exploit Code, the Android flaw that is threatening the users of the popular Google mobile OS. Experts at Zimperium Mobile Security Labs (zLabs) recently discovered a critical flaw, dubbed Stagefright affecting the Android OS. The experts revealed that the Stagefright flaw (CVE-2015-1538) potentially affects 95% of Android devices running version 2.2 to 5.1 of […]

Pierluigi Paganini September 12, 2015
iOS 9 security by design, but hacker already shows a jailbreak

Apple announced the secure iOS 9 but a popular hacker demonstrated the untethered iOS 9 Jailbreak in a video PoC before its release. Apple announced new security enhancements for its new operating system iOS 9. The new version of the Apple OS, iOS 9, will be available from September 16th on the iPhone, iPad and iPod, according the […]

Pierluigi Paganini September 11, 2015
10 Days to crack 11 Million Ashley Madison hashed passwords

Ashley Madison – A group of hackers which calls itself CynoSure Prime has cracked more than 11 Million hashed passwords protected with Bcrypt. How? Last month hackers breached the popular adultery website Ashley Madison and leaked online a dump containing data belonging to 37 Million users, including 37 Million of encrypted password. News of the day is […]

Pierluigi Paganini September 11, 2015
Cyber criminal crew DD4BC extorts businesses via DDoS

According to a report recently issued by Akamai, the DD4BC criminal group has been responsible for at least 114 DDoS attacks on its customers. According the Akamai firm, the criminal crews known as DD4BC has carried out at least 114 DDoS attacks with an average peak bandwidth of around 13.34 Gbps on its customers since April […]

Pierluigi Paganini September 11, 2015
Another computer system at the Pentagon has been hacked

Another cyber attack hit computer systems at the Pentagon, this time the food court computers have been hacked exposing employees’ bank information. In August, alleged Russian hackers have hacked an unclassified emailing server of the Pentagon, it was just one of the numerous attacks against the US Government systems. According to the NBC news, US […]

Pierluigi Paganini September 10, 2015
North Korea exploits a 0-day in the South Korea’s principal Word processor

FireEye suspects that the North Korea is responsible for a number of attacks against the South Korea relying a 0day in the South most popular Word processor. Security experts from FireEye speculate that The North Korea has carried out cyber attacks against entities of the South Korea by exploiting a zero-day ( CVE-2015-6585) in a […]

  • 1
  • 2
  • ...
  • 834
  • 835
  • 836
  • 837
  • 838
  • ...
  • 955
  • 956
  • 957

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Microsoft linked attacks on SharePoint flaws to China-nexus actors

    APT / July 23, 2025

    Cisco confirms active exploitation of ISE and ISE-PIC flaws

    Hacking / July 22, 2025

    SharePoint under fire: new ToolShell attacks target enterprises

    Hacking / July 22, 2025

    CrushFTP zero-day actively exploited at least since July 18

    Hacking / July 22, 2025

    Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

    Security / July 22, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT