You searched for: Pierluigi Paganini

New Cyber Operation Targets Italy: Digging Into the Netwire Attack Chain

ZLab malware researchers analyzed the attack chain used to infect Italian speaking victims with the Netwire malware. Introduction Info stealer…

6 years ago

Student loan company that stole millions from consumers leaks sensitive phone calls, SSNs, tax records

Researchers at Cybernews.com recently discovered an unsecured Amazon Simple Storage Service (S3) containing a huge trove of data from a student…

6 years ago

Multi-platform Tycoon Ransomware employed in targeted attacks

Experts recently discovered a multi-platform ransomware, dubbed Tycoon Ransomware, that uses a Java image file (JIMAGE) to evade detection. Experts…

6 years ago

Cyber Defense Magazine – June 2020 has arrived. Enjoy it!

Cyber Defense Magazine June 2020 Edition has arrived. We hope you enjoy this month's edition…packed with over 165 pages of…

6 years ago

Google reveals that foreign hackers are already targeting Trump and Biden campaigns

Google researchers revealed that campaign staffs for both President Donald Trump and Joe Biden have been targeted recently by foreign…

6 years ago

Cycldek APT targets Air-Gapped systems using the USBCulprit Tool

A Chinese threat actor tracked as Cycldek (aka Goblin Panda, or Conimes) has developed new tool to steal information from…

6 years ago

North Atlantic Council is warning of malicious cyber activities during COVID-19 pandemic

North Atlantic Council issued a statement warning of concerning malicious cyber activities against entities involved in the fight against COVID-19.…

6 years ago

Large-scale campaign targets configuration files from WordPress sites

Security experts have observed a large-scale campaign over the weekend aimed at stealing configuration files from WordPress sites. Security researchers…

6 years ago

Hackers hijacked Coincheck ‘s domain registrar account and targeted some users

Hackers hijacked one of the domains of the Japanese cryptocurrency exchange Coincheck and used it for spear-phishing attacks. The Japanese…

6 years ago

Two issues in Zoom could have allowed code execution

Researchers from Cisco Talos disclosed two critical flaws in the Zoom software that could have allowed attackers to hack into the systems…

6 years ago

This website uses cookies.