You searched for: Pierluigi Paganini

Mobile Trojan Development Kits allow creating ransomware without the need to write code

Researchers at Symantec have discovered Trojan Development Kits that allow creating Android ransomware without the need to write code. Ransomware…

8 years ago

Zerodium payouts for Messaging, Email App Exploits are $500,000

Zerodium payouts include up to $500,000 for RCE and privilege escalation vulnerabilities affecting popular instant messaging and email applications. The…

8 years ago

WikiLeaks – CIA used ExpressLane to covertly collect data from liaison intel services

WikiLeaks - CIA used ExpressLane to covertly collect data from liaison intel services, including FBI, DHS and the NSA, to…

8 years ago

Ropemaker attack allows to transform email in malicious ones after it’s received

The Ropemaker attack allows hackers to turn an apparently harmless email into a malicious one after it has already been…

8 years ago

Fancy Bears release data on soccer players’ TUE drug use and doping cases

Russia-linked hackers Fancy Bears claimed that around 160 football players failed drug tests in 2015, and 25 2010 World Cup…

8 years ago

Fappening 2017 – Private pictures of Miley Cyrus, Stella Maxwell, and others leaked

Fappening 2017 - Private pictures of Miley Cyrus, Stella Maxwell, Kristen Stewart, Tiger Woods and Lindsey Vonn have been posted…

8 years ago

Neptune exploit kit used to deliver Monero cryptocurrency miners via malvertising

According to a new report published by FireEye, crooks have been using the Neptune exploit kit to deliver cryptocurrency miners…

8 years ago

USS John S McCain incident, some experts speculate it was a cyber attack

On Monday, the USS John S McCain collided a Liberian-flagged tanker near Singapore, some experts speculate the incident was caused…

8 years ago

Hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket

Security researchers discovered that hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket Security experts…

8 years ago

Fileless cryptocurrency miner CoinMiner uses NSA EternalBlue exploit to spread

A new fileless miner dubbed CoinMiner appeared in the wild, it uses NSA EternalBlue exploit and WMI tool to spread. A…

8 years ago

This website uses cookies.