LATEST NEWS

VIEW ALL
US Gov used airplanes to collect American cell phone data
Pierluigi Paganini November 14, 2014

The WSJ revealed that the US authorities coordinated by the Department of Justice has been using airplanes to collect Americans' cell phone data. A new secret U.S. surveillance program was disclosed ...

How Operation Onymous managed by law enforcement impacted Tor network
Pierluigi Paganini November 14, 2014

What is changed after the law enforcement conducted the takedown of several illegal marketplaces as part of the Operation Onymous? The recent shutdown of several black market places in the Tor networ ...

The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems
Pierluigi Paganini November 13, 2014

Trend Micro issued a research paper on operations behind Predator Pain and Limitless keyloggers, both of which are easily obtainable from underground. Cybercriminals ordinary use malicious code ...

BadUSB update, it is hard to discriminate patchable USB devices
Pierluigi Paganini November 13, 2014

The researcher Karsten Nohl and his team presented an update on their BadUSB study.It is impossible to discriminate patchable devices from unpatchable ones. Earlier August 2014 the security expert Ka ...

recent articles

Security
Quest KACE SMA flaw CVE-2025-32975: when one unpatched tool opens the door to 60 organizations

CVE-2025-32975 is a critical flaw in Quest KACE SMA used for endpoint management. If exploited, it could impact all managed systems across organizations. CVE-2025-32975 is a critical flaw in Quest ...

Pierluigi Paganini May 13, 2026
Cyber Crime
Instructure settles with hackers following massive student data theft

Educational tech firm Instructure reached a deal with hackers after a major Canvas breach exposed data stolen from schools and universities. Educational tech firm Instructure says it reached an ag ...

Pierluigi Paganini May 13, 2026
Security
Critical Fortinet vulnerabilities fixed in FortiSandbox and FortiAuthenticator

Fortinet patched critical flaws in FortiSandbox and FortiAuthenticator that could let attackers remotely execute code on unpatched systems. Fortinet addressed two critical vulnerabilities affectin ...

Pierluigi Paganini May 13, 2026
Data Breach
Hackers accessed BWH Hotels reservation system for months

BWH Hotels says hackers accessed guest reservation data, including names and contacts, for over six months across multiple hotel brands. BWH Hotels disclosed a data breach, with threat actors havi ...

Pierluigi Paganini May 12, 2026
Hacking
The world's most "Dangerous" AI, Anthropic’s Mythos, found only one flaw in curl

Anthropic’s AI found five vulnerabilities in curl, but only one low-severity issue proved to be a real vulnerability. In April, Anthropic made considerable noise announcing Mythos, a new artific ...

Pierluigi Paganini May 12, 2026
Cyber Crime
Attackers exploit cPanel CVE-2026-41940 to deploy Filemanager Backdoor

Attackers are exploiting cPanel flaw CVE-2026-41940 to install the Filemanager backdoor and gain unauthorized admin access. Cybercriminals are actively exploiting the critical cPanel vulnerability ...

Pierluigi Paganini May 12, 2026
Malware
WannaCry, the ransomware attack that changed the history of cybersecurity

WannaCry showed how unpatched flaws and leaked cyber tools can cripple global systems, reshaping cybersecurity defenses worldwide. In memory of the day the digital world was shaken, but learned to ...

Pierluigi Paganini May 12, 2026
Malware
Android banking Trojan TrickMo evolves using TON network for C2

ThreatFabric found a new TrickMo Android trojan focused on stealth and persistence, moving its command-and-control traffic to the TON network. Security researchers at ThreatFabric have recently id ...

Pierluigi Paganini May 12, 2026
Data Breach
Identity security firm SailPoint discloses GitHub repository breach

SailPoint disclosed a GitHub repository breach on April 20. The company contained the incident and said no customer data was affected. SailPoint is a cybersecurity company that provides identity s ...

Pierluigi Paganini May 11, 2026
Artificial Intelligence
Google warns artificial intelligence is accelerating cyberattacks and zero-day exploits

Google says hackers now use AI to create exploits, automate attacks, evade defenses, and target AI supply chains at scale. Artificial intelligence is rapidly changing the cyber threat landscape, a ...

Pierluigi Paganini May 11, 2026
Cyber Crime
Crimenetwork returns after takedown, dismantled again by German authorities

German police shut down a revived Crimenetwork marketplace with 22,000 users and 100+ sellers months after the original takedown. German police dismantled a resurrected version of the German-langu ...

Pierluigi Paganini May 11, 2026
Security
U.S. CISA adds a flaw in BerriAI LiteLLM to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BerriAI LiteLLM to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security A ...

Pierluigi Paganini May 11, 2026
Security
Instagram removed end-to-end encryption for DMs. What should users do?

Instagram removes direct messages (DM) end-to-end encryption May 8, 2026, letting Meta access chats. Users should download backups amid privacy concerns and U.S. law pressure. Starting May 8, 2026 ...

Pierluigi Paganini May 11, 2026
Security
New cPanel vulnerabilities could allow file access and remote code execution

cPanel fixed three flaws that could allow file reads, code execution, and privilege escalation. No active exploitation has been reported yet. cPanel has released security updates to fix three vuln ...

Pierluigi Paganini May 10, 2026
Malware
Official JDownloader site served malware to Windows and Linux users between May 6 and May 7

JDownloader website was hacked to distribute malicious Windows and Linux installers carrying a Python RAT between May 6–7, 2026. JDownloader official website was compromised in a supply chain at ...

Pierluigi Paganini May 10, 2026
Malware
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 96

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter CloudZ RAT potentially steals OTP messag ...

Pierluigi Paganini May 10, 2026
Malware
Quasar Linux RAT (QLNX): A Fileless Linux Implant Built for Stealth and Persistence

Researchers uncovered QLNX, a Linux RAT targeting developers to steal credentials, log keystrokes, monitor systems, and enable remote access. Security researchers discovered a previously undocumen ...

Pierluigi Paganini May 09, 2026
Data Breach
Braintrust security incident raises concerns over AI supply chain risks

Braintrust warned customers to rotate API keys after hackers breached an AWS account, exposing secrets tied to cloud-based AI models. AI observability startup Braintrust warned customers to rotate ...

Pierluigi Paganini May 09, 2026
Cyber Crime
RansomHouse says it breached Trellix and exposes internal systems

RansomHouse claimed responsibility for the Trellix breach, adding the security firm to its Tor data leak site and sharing screenshots of internal systems. The RansomHouse ransomware group has clai ...

Pierluigi Paganini May 08, 2026
Security
Cyberattacks on Poland's Water Plants: A Blueprint for Hybrid Warfare

Poland's ABW confirmed hackers breached ICS at five water plants, gaining ability to alter equipment settings. Russia-linked APT groups suspected. Poland’s Internal Security Agency (ABW) has pub ...

Pierluigi Paganini May 08, 2026