You searched for: Pierluigi Paganini

Operation In(ter)reception targets Military and Aerospace employees in Europe and the Middle East

Experts uncovered a new cyber-espionage campaign, dubbed "Operation In(ter)reception," aimed at aerospace and military organizations in Europe and the Middle…

6 years ago

Adobe Patches 18 Critical Code Execution Flaws Across Five Products

Adobe addressed 18 critical code execution flaws in After Effects, Illustrator, Premiere Pro, Premiere Rush, and Audition products. Adobe addressed 18…

6 years ago

CIA elite hacking unit was not able to protect its tools and cyber weapons

A CIA elite hacking unit that developed cyber-weapons failed in protecting its operations, states an internal report on the Vault…

6 years ago

30,000+ Italian sales agents’ personal data, IDs leaked by Ariix Italia

A database allegedly belonging to Ariix Italia was exposed online on an unsecured Amazon S3 bucket, it includes 30,000+ Italian sales…

6 years ago

Ripple20 flaws in Treck TCP/IP stack potentially expose hundreds of millions of devices to hack

Serious security vulnerabilities in the Treck TCP/IP stack dubbed Ripple20 expose millions of IoT devices worldwide to cyber attacks, researchers…

6 years ago

BigDebIT flaws in Oracle EBS allow hackers to alter financial records

Oracle addressed two flaws in E-Business Suite solution that can be exploited by attackers to tamper with an organization’s financial…

6 years ago

T-Mobile suffered a major outage in the US allegedly caused by a massive DDoS attack

Wireless carrier T-Mobile suffered a major outage in the United States, that impacted service at other carriers, due to a…

6 years ago

Norway suspends its COVID-19 contact tracing app due to privacy concerns

Norway's health authorities announced the suspension of the design of a COVID-19 contact tracing app due to privacy concerns. In…

6 years ago

Flaws in mobile Internet protocol GTP allow hackers to target 5G users

Security vulnerabilities in modern communication protocol GTP used by mobile network operators can be exploited by attackers to target 4G/5G…

6 years ago

Black Kingdom ransomware operators exploit Pulse VPN flaws

Black Kingdom ransomware operators are targeting organizations using unpatched Pulse Secure VPN software to deploy their malware. Researchers from security…

6 years ago

This website uses cookies.