• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

 | 

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Laws and regulations

Pierluigi Paganini September 24, 2015
PROTECTING CYBER VENDOR SERVICES WITH CYBERLAW

How does this privacy apply to cybersecurity? The rule of the cyberlaw in the protection of cyber vendor services against the risk of litigation exposure. In most countries and most legal systems, the sanctity of the attorney client relationship is guarded by the courts. Without confidentiality and privacy, the system of law can break down […]

Pierluigi Paganini September 23, 2015
National Encryption Policy draft, everyone is under strict surveillance

The Indian Government plans to release the new National Encryption Policy, a law that seems to be one of the big threat to the Internet freedom. A new problem is worrying the Indian friends, the Government plans to release a new policy, National Encryption Policy’ that seems to presage disappointments for users. Among ugly and questionable issues […]

Pierluigi Paganini September 23, 2015
China spies on airline passengers with IMSI-catchers

The popular expert John McAfee claims passengers with four Chinese airlines are spied with the IMSI-catchers technology by the Government of Beijing. The former owner of McAfee security firm, John McAfee was always known to have made some controversial comments in the IT industry, but also to have good sources that let him get precious […]

Pierluigi Paganini September 20, 2015
AVG will sell user’s personal data to third-parties

The Antivirus maker AVG has announced its privacy policy in which the company informs users that it will collect and sell users’ personal data to advertisers. If you think that there is something really free on the Internet you are probably wrong. Someone ask you to pay for their products and services, others use their […]

Pierluigi Paganini September 15, 2015
Microsoft joint force with NATO to improve EU Cybersecurity

Microsoft announced the signing of a Government Security Program (GSP) agreement with the NATO Communications and Information Agency. At NATO’s annual cyber conference early this week, Microsoft announced the signing of an agreement with the NATO Communications and Information Agency that aims to improve cyber security in the EU. “We see this signing as another step […]

Pierluigi Paganini September 15, 2015
FBI warns customers, get Internet of Things away from the Internet

A recent announcement issued by the Federal Bureau of Investigation warns customers that Internet of Things poses opportunities for cyber crime. The FBI is worried by rapid diffusion of the Internet of Things devices, according law enforcement smart objects could represent a serious threat for cyber security, and more in general for the society. Security […]

Pierluigi Paganini September 06, 2015
DoJ defines new rules for spying with the Stingray technology

The US Justice Department issued guidelines for StingRay Surveillance devices, new rules define aim to ensure privacy protection and transparency. Do you know what is a StingRay? If you want further details give a look to a post I wrote for the Infosec Institute on the StingRay Technology: “StingRay is an IMSI-catcher (International Mobile Subscriber […]

Pierluigi Paganini September 02, 2015
US weighs sanctioning China and Russia in response to recent cyber attacks

The Obama administration weighs sanctioning China and Russia in response to recent cyber attacks who have exposed sensitive data of the US Govt and US firms. The US Government is considering sanctions against both Russian and Chinese hackers in response to the hacking campaign targeting US entities. The news was reported by several U.S. officials yesterday who […]

Pierluigi Paganini August 30, 2015
Teenagers arrested after using the Lizard Squad DDoS tool

Six British teenagers have been arrested on suspicion of attacking websites by using the Lizard Squad’s DDoS tool, the Lizard Stresser. Lizard Squad is the popular hacking crew that brought the online gaming networks Sony PlayStation Network and Microsoft Xbox Live with major Distributed Denial-of-Service (DDoS) attacks. The hackers developed a tool dubbed Lizard Stresser that draws on Internet […]

Pierluigi Paganini August 27, 2015
The US government created new rules for Cloud Providers

A new set of rules was created by the Department of Defense (DoD) for Cloud Providers to report security holes when dealing with US government data. A new set of rules was created by the Department of Defense (DoD) of the US government for how the cloud providers should report the security issues that involve […]

  • 1
  • 2
  • ...
  • 29
  • 30
  • 31
  • 32
  • 33
  • ...
  • 40
  • 41
  • 42

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

    Cyber Crime / June 26, 2025

    Cisco fixed critical ISE flaws allowing Root-level remote code execution

    Security / June 26, 2025

    U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

    Security / June 26, 2025

    CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

    Hacking / June 26, 2025

    Hackers deploy fake SonicWall VPN App to steal corporate credentials

    Hacking / June 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT