• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

SonicWall warns customers to reset credentials after MySonicWall backups were exposed

 | 

CVE-2025-10585 is the sixth actively exploited Chrome zero-day patched by Google in 2025

 | 

Jaguar Land Rover will extend its production halt into a third week following a cyberattack

 | 

China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy

 | 

Microsoft and Cloudflare teamed up to dismantle the RaccoonO365 phishing service

 | 

DoJ resentenced former BreachForums admin to three years in prison

 | 

Apple backports fix for actively exploited CVE-2025-43300

 | 

New supply chain attack hits npm registry, compromising 40+ packages

 | 

Cybercrime group accessed Google Law Enforcement Request System (LERS)

 | 

China-linked Mustang Panda deploys advanced SnakeDisk USB worm

 | 

Insider breach at FinWise Bank exposes data of 689,000 AFF customers

 | 

Hackers steal millions of Gucci, Balenciaga, and Alexander McQueen customer records

 | 

Fairmont Federal Credit Union 2023 data breach impacted 187K people

 | 

UK ICO finds students behind majority of school data breaches

 | 

INC ransom group claimed the breach of Panama’s Ministry of Economy and Finance

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 62

 | 

Security Affairs newsletter Round 541 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

ShinyHunters Attack National Credit Information Center of Vietnam

 | 

FBI warns of Salesforce attacks by UNC6040 and UNC6395 groups

 | 

HybridPetya ransomware bypasses UEFI Secure Boot echoing Petya/NotPetya

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Hacking

Pierluigi Paganini September 26, 2015
Karma Police, how GCHQ tried to track every visible user on Internet

A new collection of GCHQ’s documents published by The Intercept reveals how the British Agency tried to track Web visits of “every visible user on Internet” A new revelation made by The Intercept confirms that the UK Government Communications Headquarters (GCHQ) has conducted  a massive online surveillance starting from the 2007. The documents accessed by The Intercept detailed an operation […]

Pierluigi Paganini September 25, 2015
Lenovo caught with pre-installed tracking application for the third time

Michael Horowitz from Computerworld discovered an application called “Lenovo Customer Feedback Program 64,” which is used to gather customers feedback data. Once, two, three … this is the third time that security experts discover a spyware pre-installed on Lenovo laptops and workstations, and also in this case without the knowledge of its millions of users. […]

Pierluigi Paganini September 25, 2015
Naikon APT Group backed by the Chinese PLA Unit 78020

According to a new report the popular Naikon APT group is actually backed by China’s PLA Unit 78020, a firm traced it through online activity. Ge Xing, also known as “GreenSky27,” is the name of an alleged member of the People’s Liberation Army unit 78020, a group of Chinese state-sponsored hackers. The man was identified […]

Pierluigi Paganini September 24, 2015
XCodeGhost Attack – Is Apple’s Biggest Hack Ever linked to the US Intelligence?

Rumors on the Internet are linking the attack based in XcodeGhost to operations conducted by the CIA (Central Intelligence Agency). A few days ago principal security firm reported the first major cyber attack on the official Apple App Store, thousands of legitimate applications were infected by the XCodeGhost Malware. Apple announced it is cleaning up the […]

Pierluigi Paganini September 24, 2015
Data breaches, stolen data and their sale in the Dark Web

Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their offer in the Dark Web. Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their offer in the Dark Web. Stolen data is a precious commodity […]

Pierluigi Paganini September 24, 2015
OPM stolen data includes 5.6 Million Fingerprints

According to the a statement by OPM Press Secretary Sam Schumach on Background Investigations Incident OPM breach included 5.6 Million Fingerprints. The press secretary of the Office of Personnel Management, Sam Schumach, announced that the data breach suffered by the OPM exposed approximately 5.6 million sets of fingerprints belonging to federal employees, contractors, and other members of the staff. In […]

Pierluigi Paganini September 23, 2015
China spies on airline passengers with IMSI-catchers

The popular expert John McAfee claims passengers with four Chinese airlines are spied with the IMSI-catchers technology by the Government of Beijing. The former owner of McAfee security firm, John McAfee was always known to have made some controversial comments in the IT industry, but also to have good sources that let him get precious […]

Pierluigi Paganini September 23, 2015
Targeted attacks on 4Chan and 8Chan exploited bot code in Imgur

Recently a serious vulnerability was discovered in the Imgur service that allowed the injection of malicious code into an image link on the popular website. Is your website popular? Great you are a privileged target for crooks, just yesterday I reported the last malvertising campaign that hit Forbes and today I decide to present a […]

Pierluigi Paganini September 22, 2015
Access Private Photos and Contacts Without a Passcode on iOS 9 devices

A hacker has found a way to access images and contacts stored on Apple iOS 9 devices even if they are protected with a passcode or Touch ID. A few hours ago I have posted the news on the decision of the Security firm Zerodium to pay a 1 Million Dollars prize for zero-day exploits and jailbreak […]

Pierluigi Paganini September 22, 2015
Find a zero-day exploit to hack IOS 9 and win a $1m prize

Zerodium is an Exploit trader and it’s offering a million dollar prize to any person that finds zero-day flaws in iOS 9, and you can imagine the motivation. Zerodium is an Exploit trader and it’s offering a million dollar prize to any person that finds unknown, unpatched bug in iOS 9 with the main purpose to […]

  • 1
  • 2
  • ...
  • 842
  • 843
  • 844
  • 845
  • 846
  • ...
  • 966
  • 967
  • 968

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    SonicWall warns customers to reset credentials after MySonicWall backups were exposed

    Data Breach / September 18, 2025

    CVE-2025-10585 is the sixth actively exploited Chrome zero-day patched by Google in 2025

    Uncategorized / September 18, 2025

    Jaguar Land Rover will extend its production halt into a third week following a cyberattack

    Security / September 18, 2025

    China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy

    APT / September 17, 2025

    Microsoft and Cloudflare teamed up to dismantle the RaccoonO365 phishing service

    Cyber Crime / September 17, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT