• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 

Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

 | 

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

 | 

U.S. CISA urges to immediately patch Microsoft SharePoint flaw adding it to its Known Exploited Vulnerabilities catalog

 | 

Microsoft issues emergency patches for SharePoint zero-days exploited in "ToolShell" attacks

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Intelligence

Pierluigi Paganini March 31, 2014
Turkish Government is hijacking the IP for popular DNS providers

The Turkish Government ordered to Turk Telekom to hijack the IP address for popular free and open DNS providers such as Google’s 8.8.8.8. This is a sad moment for friends in Turkey, the Government  is under the illusion that censoring the media will be able to suppress the thought of those who disagree. A few […]

Pierluigi Paganini March 30, 2014
How GCHQ and NSA spied on German citizens and global politics

GCHQ infiltrated German firms while NSA obtained a court order to spy on Germany and collected information about the chancellor in a special database. A new report published by Der Spiegel agency based on the document leaked by Edward Snowden has revealed that the National Security Agency (NSA) and the British Government Communications Headquarters (GCHQ) spied on private […]

Pierluigi Paganini March 28, 2014
Google Transparency Report at first glance

Google has published its new Google Transparency Report related to the second semester of 2013, the number of requests for user information is still increasing. While the Internet users continue to claim their right to online privacy condemning the numerous surveillance program and the censorship conducted by governments all around the world, it seems that the […]

Pierluigi Paganini March 23, 2014
NSA hacked Huawei network for cyber espionage

NSA leaked documents, analyzed by Der Spiegel and The Times, report that NSA has hacked Huawei network to demonstrate the link with Chinese PLA. In the past years, many times US authorities and private industry have accused Chinese electronics manufacturer Huawei of cyber espionage, let’s remind also that Symantec has broken its joint-venture with the […]

Pierluigi Paganini March 23, 2014
IntelCrawler profiled Syrian Electronic Army group

The intelligence firm IntelCrawler has published a report on the activities of the Syrian Electronic Army. Are they hacktivists or cyber spies? IntelCrawler, a cyber-threat intelligence company has recently issued an interesting report on the activities of the Syrian Electronic Army (SEA), the experts analyzed a series of event since since its first appearance in […]

Pierluigi Paganini March 22, 2014
Orange Telecom company grants full data access to French intelligence

The Orange telecom company is providing its data to France intelligence agency, the Direction Générale de la Sécurité Extérieure. The name of Orange Telecom operator is again under discussion after the giant has threatened to sue the NSA for hacking into the underwater cable. Last revelations are not on the NSA operations, instead the leaked documents report […]

Pierluigi Paganini March 21, 2014
SEA has stolen invoices that shows Microsoft charges FBI for user data

A collection of emails hacked by the group Syrian Electronic Army shows that Microsoft charges the FBI’s Digital Intercept Technology Unit for user data. No more than a week ago hackers of the group Syrian Electronic Army (SEA) published online documents leaked from US CENTCOM repository, now the pro President Bashar al-Assad sad hacking team successfully penetrated […]

Pierluigi Paganini March 19, 2014
NSA programs MYSTIC and RETRO spies phone calls on global scale, also on past conversations

Documents leaked by Snowden reveals that NSA has built a surveillance system capable of recording all the phone calls of a foreign country. The information on the surveillance capabilities of the National Security Agency is updated on a daily base and last news is that the agency has the necessary technology to record all the […]

Pierluigi Paganini March 17, 2014
QUANTUMHAND – NSA impersonates Facebook to inject malware

Recent revelations on TURBINE platform include also a disturbing truth, NSA used QUANTUMHAND exploits to implant malware in Facebook users’ machines. Last Week Ryan Gallagher and Glenn Greenwald revealed the existence of TURBINE platform, a sophisticated hacking architecture used to take control of botnet C&C servers managed by cybercrime. One of the details revealed by the journalists raised a heated […]

Pierluigi Paganini March 14, 2014
TURBINE, how NSA has plundered botnets to the cybercrime

TURBINE is the codename for a sophisticated hacking platform to take control of C&C servers managed by cybercrime. The NSA has been hijacking the botnets managed by cybercrime to its own purpose, this is the last revelation on questionable activities of the agency. Also this last revelation is based on documents leaked by Snowden, the news was […]

  • 1
  • 2
  • ...
  • 145
  • 146
  • 147
  • 148
  • 149
  • ...
  • 170
  • 171
  • 172

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

    Intelligence / July 25, 2025

    Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

    Security / July 25, 2025

    Koske, a new AI-Generated Linux malware appears in the threat landscape

    Malware / July 25, 2025

    Mitel patches critical MiVoice MX-ONE Auth bypass flaw

    Security / July 25, 2025

    Coyote malware is first-ever malware abusing Windows UI Automation

    Malware / July 24, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT