You searched for: Pierluigi Paganini

Singapore was hit by an unprecedented number of attacks during the Trump-Kim Summit

Researchers observed a spike in the number of cyber-attacks targeting Singapore during the Trump-Kim Summit, from June 11 to June 12. Researchers at F5…

7 years ago

A new MuddyWater Campaign spreads Powershell-based PRB-Backdoor

Trend Micro spotted a new attack relying on weaponized Word documents and PowerShell scripts that appears related to the MuddyWater APT. Security…

7 years ago

A new Meltdown-like flaw tracked as LazyFP affects Intel CPUs

A new vulnerability involving side channel speculative execution on Intel chips, known as LazyFP, has been announced and assigned CVE-2018-3665.…

7 years ago

Mysterybot, a new LokiBot-Linked Android Trojan Emerges

Threat Fabric reports of a newly discovered banking Trojan, dubbed Mysterybot, targeting Android 7 and 8 versions, the malware seems to…

7 years ago

Experts released a free decryptor for Everbe Ransomware

Researchers have released a decryptor tool that could be used by victims of the Everbe Ransomware to decrypt their files for…

7 years ago

SigSpoof GnuPG flaw could be exploited to spoof message signatures

GnuPG 2.2.8 released earlier this month addresses the CVE-2018-12020 vulnerability, dubbed SigSpoof, affecting GnuPG, Enigmail, GPGTools, and python-gnupg. GnuPG, also known as GPG, is a…

7 years ago

Analyzing the SAP June 2018 Security Patch Day

SAP June 2018 Security Patch Day addresses two security notes, the company fixed five issues for previously released notes, including two…

7 years ago

2018 Russia World Cup : Russian cyber spy may hack travelers’ mobile devices

According to a top US intelligence official, mobile phones of football fans traveling to Russia for the World Cup could…

7 years ago

European Parliament decides to ban Kaspersky products because are malicious

76. Calls on the EU to perform a comprehensive review of software, IT and communications equipment and infrastructure used in…

7 years ago

Analysis of the evolution of exploit kits in the threat landscape

Cyber criminal organizations and state-sponsored hackers continue to use Exploit kits to compromise targets world worldwide if the use of…

7 years ago

This website uses cookies.