• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

 | 

Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

 | 

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Malware

Pierluigi Paganini February 07, 2015
11 percent of mobile banking apps includes harmful code

A recent study published by RiskIQ security firm revealed that more than 11 percent of mobile banking apps includes harmful code. With the rapid spread of mobile banking services has increased significantly the number of cyber crimes targeting users of major financial institutions. According to an interesting research conducted by the company RiskIQ more than 11 […]

Pierluigi Paganini February 07, 2015
Fake WhatsApp for Web offered in the wild

Cybercriminals are offering worldwide a fake WhatsApp for Web in spam campaign with the intent to serve banking malware and run other kinds of scams. Recently WhatsApp launched its web service that could be used by using Google Chrome and allows users to access all the conversations and messages from the mobile device. “Our web client is […]

Pierluigi Paganini February 06, 2015
Fessleak malvertising campaign used to serve ransomware

Invincea has been monitoring the Fessleak campaign in which hackers leveraged Adobe Flash Player exploits and file-less infections to serve ransomware. Security experts from Invincea are investigating on a new Ransomware campaign originated in Russia that presented many interesting characteristics. The researchers discovered that the attacks started by using file-less infections then moved to the […]

Pierluigi Paganini February 05, 2015
Risks related to the use of digital certificates

A recent report published by experts at Kaspersky Lab revealed that the number of abuses for digital certificates is in constant increase. According to a recent report published by Kaspersky Lab the number of untrusted certificates used to sign malicious code is doubled in the last year. The reason is that there is the wrong […]

Pierluigi Paganini February 04, 2015
Operation Pawn Storm hackers use a iOS spyware

By investigating on the cyber espionage campaign dubbed Operation Pawn Storm, experts at TrendLabs discovered a spyware designed for iOS devices. Security experts at TrendLabs have discovered a new espionage iOS app while they were investigating on the cyber espionage campaign dubbed Operation Pawn Storm. In October 2014, security experts at Trend Micro uncovered a cyber […]

Pierluigi Paganini February 04, 2015
Android adware infected more than 15 millions users via Play store

Security experts at Avast have discovered three malicious Android apps that were serving Adware, more than 15 million users infected via Play store. Adware is one of the most insidious threat to the mobile platform, this family of malicious code is used by threat actors to automatically display or downloads advertising material when a user […]

Pierluigi Paganini February 04, 2015
Experts uncovered a massive CTB-Locker ransowmare campaign

Security researchers at the CERT team at Société Générale uncovered a new malware campaign which is spreading the CTB-Locker or Critroni crypto ransomware. Security experts at the CERT team at Société Générale discovered a new malware campaign delivering the CTB-Locker or Critroni crypto ransomware. In the past, the criminals used the popular Angler exploit kit in order […]

Pierluigi Paganini January 31, 2015
f0xy CPUminer malware improved with evasion techniques

Researchers at Websense are investigating on the evolution of the financial ‘f0xy’ malware which is improved with new interesting features. Security experts at Websense have spotted a new strain of malware dubbed “f0xy” that leverages legitimate websites and web services in order to run malicious activities. A first sample of f0xy discovered by Websense is dated January 13, […]

Pierluigi Paganini January 30, 2015
A singular Facebook Trojan has already infected nearly 110,000 Facebook users

Security researcher is investigating in a new strain of Facebook Trojan that in just two days has already infected 1110,000 Facebook users. Social networks represent a privileged attack vector for malware-based attacks, a recent investigation conducted by by the security researcher Mohammad Faghani revealed the existence of a Trojan is circulating among Facebook users. According to the researcher, […]

Pierluigi Paganini January 30, 2015
News Zeus shows significant a evolution in the criminal ecosystem

Researchers at SentinelOne have discovered a strain of the Zeus malware that includes a very sophisticated control panel and evasion techniques. Malware researchers at SentinelOne  have spotted a new Zeus variant that was used to target major Canadian banks, including the National Bank of Canada, the Bank of Montreal and the Royal Bank of Canada. […]

  • 1
  • 2
  • ...
  • 440
  • 441
  • 442
  • 443
  • 444
  • ...
  • 490
  • 491
  • 492

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

    Malware / July 27, 2025

    Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / July 27, 2025

    Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

    Cyber Crime / July 26, 2025

    Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

    Intelligence / July 26, 2025

    Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

    Intelligence / July 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT