You searched for: Pierluigi Paganini

Mount Locker ransomware operators demand multi-million dollar ransoms

The operators behind new ransomware dubbed Mount Locker have adopted the same tactic of other gangs threatening the victims to…

5 years ago

Unknown FinSpy Mac and Linux versions found in Egypt

Experts from Amnesty International uncovered a surveillance campaign that targeted Egyptian civil society organizations with a new version of FinSpy…

5 years ago

Google removes 17 Joker -infected apps from the Play Store

Google removed this week 17 Android apps from its Play Store because they were infected with the Joker (aka Bread)…

5 years ago

Security Affairs newsletter Round 283

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

5 years ago

Microsoft took down 18 Azure AD apps used by Chinese Gadolinium APT

Microsoft removed 18 Azure Active Directory applications from its Azure portal that were created by a Chinese-linked APT group Gadolinium.…

5 years ago

A powerful DDoS attack hit Hungarian banks and telecoms services

Hungarian financial institutions and telecommunications infrastructure were hit by a powerful DDoS attack originating from servers in Russia, China and…

5 years ago

Victims of ThunderX ransomware can recover their files for free

Good news for the victims of the ThunderX ransomware, cybersecurity firm Tesorion has released a decryptor to recover their files…

5 years ago

Hackers stole more than $150 million from KuCoin cryptocurrency exchange

Singapore-based cryptocurrency exchange KuCoin disclosed a security breach, hackers stole $150 million from its hot wallets. Singapore-based cryptocurrency exchange KuCoin…

5 years ago

Source Code of Windows XP, Server 2003 leaked

The source code for Microsoft's Windows XP and Windows Server 2003 operating systems was published as a torrent file on…

5 years ago

Twitter warns developers of possible API keys leak

Twitter is warning developers that their API keys, access tokens, and access token secrets may have been exposed in a…

5 years ago

This website uses cookies.