You searched for: Pierluigi Paganini

New KillDisk variant targets Windows machines in financial organizations in Latin America

A new variant of the infamous disk-wiper malware KillDisk has been spotted by malware researchers at Trend Micro while targeting…

8 years ago

Spectre/Meltdown patches had a significant impact on SolarWinds’s AWS infrastructure

Analysis conducted by SolarWinds on the impact on the performance of the Spectre/Meltdown patches on its own Amazon Web Services…

8 years ago

Blackwallet hacked, hackers stole $400,000 from users’ accounts through DNS hijacking

BlackWallet.co was victims of a DNS hijacking attack, on January 13 the attackers have stolen over $400,000 from users' accounts (roughly…

8 years ago

Mirai Okiru botnet targets for first time ever in the history ARC-based IoT devices

Researcher @unixfreaxjp spotted the first time ever in the history of computer engineering a Linux malware designed to infect ARC CPU,…

8 years ago

Security Affairs newsletter Round 145 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again…

8 years ago

Lenovo spotted and fixed a backdoor in RackSwitch and BladeCenter networking switches

Lenovo discovered a firmware backdoor in RackSwitch and BladeCenter networking switch families during an internal security audit. Security experts at Levono…

8 years ago

Fappening – A fourth man has been charged with hacking into over 250 Apple iCloud accounts belonging to celebrities

Fappening - A fourth hacker, George Garofano (26), of North Branford, has been charged with hacking into over 250 Apple iCloud…

8 years ago

New MaMi Malware targets macOS systems and changes DNS settings

The popular security researcher Patrick Wardle spotted MaMi malware, a new threat malware designed to hijack DNS settings on macOS…

8 years ago

Mobile App Flaws of SCADA ICS Systems Could Allow Hackers To Target Critical Infrastructure

IOACTIVE researchers warn that critical infrastructure mobile applications are being developed without secure coding compliance that could allow hackers to…

8 years ago

Game of Drones – Researchers devised a technique to detect drone surveillance

A group of Israeli researchers at Ben Gurion University have built a proof-of-concept system against surveillance operated a surveillance drone.…

8 years ago

This website uses cookies.