• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

 | 

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 

Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

 | 

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Malware

Pierluigi Paganini June 16, 2014
Change in App permissions raises privacy and security issues

A review in the organization of app permissions made by Google could allow malicious apps to silently gain further permissions on the victim’s device. Google has recently made a significant change to the management process for permissions on Android devices, unfortunately security experts noticed that the change could advantage bad actors that intend to conduct attacks against the mobile […]

Pierluigi Paganini June 15, 2014
Svpeng Android ransomware is impossible to repel after the infection

Experts at Kaspersky Lab are following the evolution of Svpeng Android malware, born as banking trojan and evolved in ransomware which hit US customers. The mobile malware Svpeng is evolving and recent versions were adapted to classic extortion scheme targeting Android devices in the US. Svpeng was detected for the first time one year ago […]

Pierluigi Paganini June 14, 2014
BKDR_VAWTRAK malware uses Windows feature to defend itself

The malware specialists at Trend Micro noticed that malicious agent BKDR_VAWTRAK is abusing a Windows feature SRP to prevent victims’ defense systems. Experts at Trend Micro have discovered that Japanese Internet users are being infected by a trojan, dubbed BKDR_VAWTRAK, which uses Windows to try to defeat security software on infected machines. Like many other […]

Pierluigi Paganini June 13, 2014
Zeus malware is hard to eradicate, the criminal ecosystem continues to innovate it

Prolexic security and engineering response team has issued a study on the possible uses of Zeus malware, remarking that its success is the versatility. Zeus malware never dies, it seems the title of a film, but the reality goes over the fiction, despite the recent success of law enforcement agencies in the takeover of Gameover […]

Pierluigi Paganini June 11, 2014
Pandemiya is a written-from-scratch trojan being sold in the underground

RSA Security’s FraudAction team released a report on Pandemiya, a new banking Trojan being sold in hacker forums as an alternative to the popular Zeus. RSA Security’s FraudAction team issued a report on Pandemiya, a banking Trojan being proposed in the underground ecosystem as the most effective alternative to the Zeus banking Trojan. Pandemiya Trojan is being sold for as […]

Pierluigi Paganini June 05, 2014
TROJ_POSHCODER A ransomware uses Windows PowerShell features

Malware analysts at Trendmicro have discovered a new Ransomware malware using feature of Windows PowerShell which targeted English language users. Ransomware is one of the cyber threats that has created major problems last year, with increasing frequency cyber criminals gangs have opted for an extortion scheme to immediately monetize their efforts. Security expert have observed a surge […]

Pierluigi Paganini June 05, 2014
Simplocker, the first Android File-Encrypting Ransomware

Security experts at ESET discovered and analyzed the first Android File-Encrypting ransomware dubbed Simplocker with C&C hosted on TOR. Ransomware is  not a prerogative of desktop computers, cyber criminals are targeting also mobile platforms, recently it has been discovered the first mobile trojan able to encrypt victim’s data on Android by ESET security firm. Cyber criminals […]

Pierluigi Paganini June 04, 2014
Soraya PoS Malware, a new start in criminal ecosystem

Security experts at Arbor Networks have discovered a new type of PoS malware called Soraya that implements memory scraping and Web forms grabbing. During 2013 security experts have discovered numerous malware targeting point-of-sale systems, BlackPOS, Dexter and vSkymmer are just some example of malicious code detected in the last 12 months. Researchers at Arbor Networks have discovered a […]

Pierluigi Paganini May 31, 2014
AV alone is not enough to protect PC from zero-day malware

A recent research conducted by experts at Lastline Labs have demonstrated that AV alone is not enough to protect computers from zero-day malware. A recent research conducted by security company Lastline Labs revealed that only 51% of security solutions tested in a study are able to detect zero-day malware. Experts at Lastline Labs have analyzed hundreds […]

Pierluigi Paganini May 29, 2014
Fake Android WeChat app used to spread banking trojan in China

Security experts at Kaspersky Lab have discovered a new banking trojan, dubbed Banker.AndroidOS.Basti.a, hidden in a fake WeChat application. Cyber criminals are abusing of the brand WeChat, the popular mobile application designed by Chinese company Tencent, to arrange a malware campaign which hit Chinese users. Experts at Kaspersky Lab have discovered that cybercriminals are using an […]

  • 1
  • 2
  • ...
  • 455
  • 456
  • 457
  • 458
  • 459
  • ...
  • 490
  • 491
  • 492

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

    Cyber Crime / July 26, 2025

    Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

    Intelligence / July 26, 2025

    Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

    Intelligence / July 25, 2025

    Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

    Security / July 25, 2025

    Koske, a new AI-Generated Linux malware appears in the threat landscape

    Malware / July 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT