• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

 | 

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 

Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

 | 

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Security

Pierluigi Paganini October 29, 2012
Please can you explain what it is and how does the bitcoin work?

After the publishing of the book “Deep Dark Web” many colleagues asked me to explain how does work the finance in hidden world and which is the currency used for the transactions? Of course I receive many question also on Bitcoin by common people so I decided to introduce the basic concepts behind the famous […]

Pierluigi Paganini October 28, 2012
Is it really so simple crack your password?

The numerous attacks and data breaches occurred during the last 12 months demonstrated that despite high attentions in security the principal causes of the incidents are leak of authentication processes, absence of input validation on principal applications and of course the human factor is among the main accused. Last year different data breaches exposed millions […]

Pierluigi Paganini October 26, 2012
Cyber security landscape in Africa

Let me present you a very interesting study on cyber security landscape in Africa, conducted by IDG Connect, division of International Data Group (IDG), to which I gave my humble contribution. According the Economist data related to the first decade of this millennium shows that six of the world’s fastest growing economies were in sub-Saharan Africa. The […]

Pierluigi Paganini October 25, 2012
#AntiSecIT Analysis of the Anonymous Italian job

Last week I discussed with a friend on the risks related to attacks of the group Anonymous against strategic offices in Italy. In that occasion I didn’t excluded offensives of the group of hacktivists against institutions of my country predicting them in conjunction with the upcoming elections or financial maneuvers. Anonymous group in Italy appears […]

Pierluigi Paganini October 24, 2012
Trend Micro Q3 security report

Trend Micro has released the report “3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price” that presents a worrying trend for malware growth increased of 483%. The increment include cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform. Malware targeting Android platform increased […]

Pierluigi Paganini October 23, 2012
UK recruits “Xbox generation” youngsters for cyber war games

The future is now, I’ve often spoken about the enormous potentiality of gaming platforms and of the capabilities of young players, months ago I introduced a US project to develop an application to spy on gaming console all over the world gathering precious information on their owners. The control of a gaming console could be […]

Pierluigi Paganini October 22, 2012
How much do you know on search engines? Quis Custodiet Ipsos Custodes?

Article published on The Malta Indipendent on October 21th 2012 Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins Every day billions of people submit an unimaginable number of queries through Internet search engines.  These powerful instruments have profoundly changed the user’s perception of web content. Before  search engine popularity, “web portals”, like “DMOZ  Open […]

Pierluigi Paganini October 21, 2012
The Deep Dark Web Book Released

After much work during the last months I’m proud and happpy to announce the publishing of The Deep Dark Web book. It is AVAILABLE @Amazon website  http://www.amazon.com/The-Deep-Dark-Web-hidden/dp/1480177598 PAPER BOOK It is AVAILABLE @Amazon website  http://www.amazon.com/dp/B009VN40DU KINDLE It is AVAILABLE @SmashWords website  http://www.smashwords.com/books/view/247146 It is AVAILABLE @Barnes & Noble website    http://www.barnesandnoble.com/w/the-deep-dark-web-pierluigi-paganini/1113594408?ean=2940015852837 and we have uploaded it also to Amazon […]

Pierluigi Paganini October 21, 2012
Wrong response to zero day attacks exposes to serious risks

Recent revelations on Flame case raise the question on the efficiency of “zero day vulnerabilities“, software bugs that hackers exploit to avoid security defenses of target systems. The real problem when we talk about zero-day is related to the duration of the period in which hackers exploit the vulnerability before world wide security community respond […]

Pierluigi Paganini October 19, 2012
Prolexic Q3 2012 … a new generation of DDoS attacks

The second half of 2012 is started with an sensible increase of Distributed denial-of-service attacks against financial institutions and banking that caused several problems to the victims. To face with a so dangerous menace it’s fundament to analyze the phenomena starting from the data provided by security firms that desing solutions to protect companies from […]

  • 1
  • 2
  • ...
  • 488
  • 489
  • 490
  • 491
  • 492
  • ...
  • 517
  • 518
  • 519

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

    Cyber Crime / July 26, 2025

    Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

    Intelligence / July 26, 2025

    Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

    Intelligence / July 25, 2025

    Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

    Security / July 25, 2025

    Koske, a new AI-Generated Linux malware appears in the threat landscape

    Malware / July 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT