LATEST NEWS

VIEW ALL
2013 Norton Report, the impact of cybercrime according Symantec
Pierluigi Paganini October 09, 2013

Symantec issued 2013 Norton Report, the annual research study which examines the consumers’ online behaviors, the dangers and financial cost of cybercrime. Symantec has released the 2013 Norton Re ...

How to exploit iFramed based traffic E-shop for illegal activities
Pierluigi Paganini October 08, 2013

What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible Dancho Danchev I'll try to answer to these questions. On nume ...

How to create undetectable malware with Mac encryption mechanism
Pierluigi Paganini October 08, 2013

Researcher Daniel Pistelli demonstrated how to exploit Mac internally encryption mechanism to create an undetectable Mac OS X Malware. During the last couple of years the number of cyber threa ...

New iOS 7 flaw allows attacker to hijack Apple ID through spoofing fingerprints
Pierluigi Paganini October 07, 2013

German firm SRL has found another serious security issue in iOS 7 that allows an attacker to access the iPhone and potentially gain control over owner Apple ID New security issues for iOS 7, a ne ...

recent articles

Cyber Crime
FBI: Crooks manipulate online photos to fuel virtual kidnapping ransoms

The FBI warns of criminals altering images shared on social media and using them as fake proof of life photos in virtual kidnapping ransom scams. The FBI warns that criminals are altering publicly ...

Pierluigi Paganini December 08, 2025
Data Breach
Oracle EBS zero-day used by Clop to breach Barts Health NHS

Clop ransomware stole data from Barts Health NHS after exploiting a zero-day in its Oracle E-Business Suite. Barts Health NHS confirmed that Clop ransomware group stole data by exploiting zero-day ...

Pierluigi Paganini December 08, 2025
Security
AWS: China-linked threat actors weaponized React2Shell hours after disclosure

Multiple China-linked threat actors began exploiting the CVE-2025-55182, aka React2Shell flaw, within hours, AWS Security warns. Multiple China-linked threat actors began exploiting the CVE-2025-5 ...

Pierluigi Paganini December 08, 2025
Security
U.S. CISA adds a Meta React Server Components flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Meta React Server Components flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Secu ...

Pierluigi Paganini December 08, 2025
Malware
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 74

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Analysis of ShadowPad Attack Exploiting ...

Pierluigi Paganini December 07, 2025
Uncategorized
Security Affairs newsletter Round 553 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly Security ...

Pierluigi Paganini December 07, 2025
Security
Porsche outage in Russia serves as a reminder of the risks in connected vehicle security

Hundreds of Porsche cars in Russia became undrivable due to a malfunction in their factory-installed satellite security system, owners say. Hundreds of Porsche cars in Russia became undrivable aft ...

Pierluigi Paganini December 07, 2025
Hacking
Attackers launch dual campaign on GlobalProtect portals and SonicWall APIs

A hacking campaign is targeting GlobalProtect logins and scannig SonicWall APIs since December 2, 2025. A campaign began on December 2 targeting Palo Alto GlobalProtect portals with login attempts ...

Pierluigi Paganini December 06, 2025
Security
Maximum-severity XXE vulnerability discovered in Apache Tika

A maximum severity vulnerability in Apache Tika, tracked as CVE-2025-66516 (CVSS score of 10.0), allows XML external entity attacks. CVE-2025-66516 carries a maximum CVSS rating of 10.0 because it ...

Pierluigi Paganini December 06, 2025
Uncategorized
JPCERT/CC Reports Widespread Exploitation of Array Networks AG Gateway Vulnerability

Array Networks AG gateways have been under active exploitation since August 2025 due to a command injection flaw, JPCERT/CC warns. A command injection flaw in Array Networks AG Series gateways, af ...

Pierluigi Paganini December 05, 2025
Intelligence
BRICKSTORM backdoor exposed: CISA warns of advanced China-backed intrusions

CISA details BRICKSTORM, a China-linked backdoor used by China-linked APTs to secure long-term persistence on compromised systems. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ...

Pierluigi Paganini December 05, 2025
Hacking
U.S. CISA adds a new an OpenPLC ScadaBR flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a new OpenPLC ScadaBR flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agen ...

Pierluigi Paganini December 04, 2025
Data Breach
Marquis data breach impacted more than 780,000 individuals

Hackers breached fintech firm Marquis, stealing personal and financial data, the security breach impacted over 780,000 people. Hackers breached fintech firm Marquis and stole personal and financia ...

Pierluigi Paganini December 04, 2025
Data Breach
ASUS confirms vendor breach as Everest gang leaks data, claims ArcSoft and Qualcomm

ASUS confirms a third-party breach after Everest leaks sample data. Hackers also claim ArcSoft and Qualcomm. ASUS says a third-party breach exposed data after Everest ransomware leaked samples, cl ...

Pierluigi Paganini December 04, 2025
Security
Cloudflare mitigates record 29.7 Tbps DDoS attack by the AISURU botnet

Cloudflare blocked a record 29.7 Tbps DDoS attack from the AISURU botnet. The 69-second attack set a new high, though the target remains undisclosed. Cloudflare stopped a record 29.7 Tbps DDoS att ...

Pierluigi Paganini December 04, 2025
Hacking
King Addons flaw lets anyone become WordPress admin

Hackers are exploiting a King Addons flaw (CVE-2025-8489) that lets anyone register and instantly gain admin privileges on WordPress sites. Hackers are exploiting a critical vulnerability, tracked ...

Pierluigi Paganini December 03, 2025
Data Breach
University of Pennsylvania and University of Phoenix disclose data breaches

The University of Pennsylvania and the University of Phoenix confirm they were hit in the Oracle E-Business Suite hacking campaign. The University of Pennsylvania (Penn) and the University of Phoe ...

Pierluigi Paganini December 03, 2025
Hacking
Researchers spotted Lazarus’s remote IT workers in action

Researchers exposed a Lazarus scheme using remote IT workers tied to North Korea’s Famous Chollima APT group in a joint investigation. Researchers filmed Lazarus APT group’s remote-worker sche ...

Pierluigi Paganini December 03, 2025
Laws and regulations
India mandates SIM-linked messaging apps to fight rising fraud

India ordered messaging apps to work only with active SIM cards linked to users’ phone numbers to curb fraud and misuse. India's Department of Telecommunications (DoT) now requires providers of ...

Pierluigi Paganini December 03, 2025
Security
U.S. CISA adds Android Framework flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Android Framework flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency ...

Pierluigi Paganini December 02, 2025