• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Censorship

Pierluigi Paganini December 15, 2011
The year of the networked protest, from SOPA act to Anonymous

It’s end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what else will we remember of this 2011? No doubts, we will remember the new way to use Internet, an irreplaceable vector for social protests, expression of social malaise and of too much stolen liberty. We […]

Pierluigi Paganini December 12, 2011
From the mosaic theory to the stuxnet case

With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation. A natural extension of the method hit its application to ordinary life. Mosaic theory involves collecting information from different sources, public and private, to calculate the value of security. The key concept is the collection and […]

Pierluigi Paganini December 11, 2011
India The blurred line between defense and cyber censorship

In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose people I admire for their professionalism and dedication to work, India. In my previous article “Cyber India” lights and shadows of the country full of contradictions I presented a picture of the nation in terms of cyberwarfare, […]

Pierluigi Paganini December 07, 2011
The utopian privacy

Are you able to imagine a world in which everybody is free to communicate without being intercepted, spied on, tracked? Have you ever dreamt, reading sad and bad news pages on the censure of many governments, a world where the concept of freedom of thought has been materialized? In recent decades we have witnessed radical […]

Pierluigi Paganini December 05, 2011
“Cyber India” lights and shadows of the country full of contradictions

The Economy of India is the ninth largest in the world by nominal GDP and the fourth largest by purchasing power parity (PPP). The country is a part of the G-20 major economies, Goldman Sachs predicts that “from 2007 to 2020, India’s GDP per capita in US$ terms will quadruple”, and that the Indian economy will surpass the United States (in US$) by 2043, this are […]

Pierluigi Paganini December 04, 2011
Stuxnet, Duqu & Conficker, a new generation of cyber weapons … even “without a father”

Cyber warfare expert John Bumgarner claims that the Stuxnet and Duqu virus have been active for much longer than previously suspected, he says that they are active in different variant since 2006. Precisely he claims that the Stuxnet computer virus is linked to Conficker, a mysterious “worm” that surfaced in late 2008 and infected millions […]

Pierluigi Paganini December 02, 2011
Social Network Poisoning … they want to spy on us, we evade

Social Network Poisoning term refers the effect produced by the application of methods designed to make unreliable the knowledge related to a profile and its relationships. “Be Social” is the imperative of the last years. We live alternative lives, we have dense networks of relationships, we feel the irrepressible urge to be part of a group, to fill the void that we carry within. But this human propensity to aggregation is now the foundation of the […]

Pierluigi Paganini December 02, 2011
Assange, Spy Files and uncomfortable truths

If we talk about security which could be our worst nightmare? My answer is “to be vulnerable in every moment of our day, whatever we are doing and wherever we are” How could this happen? Imagine that someone has installed an app on our phones, and he is able to stalk us, to know our […]

Pierluigi Paganini November 27, 2011
E-Corruption … “who controls the controller?”

The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and USA. The crucial point is the legality of these actions conducted  by Intelligence Agencies in the name of Nations Security abusing the rights of citizens.  To this we must consider another  significant issue , the corruption.  Corruption has no Country and is a cross problem […]

Pierluigi Paganini November 25, 2011
ISP can’t be forced to filter transmissions inherent in copyright-infringing content

In recent months it has had discussions about the possibility of blocking sites that somehow support the distribution of pirated software. How to identify these sites? How to find and block communications to the final users. The role of the ISPs is fundamental because it was asked them to monitor the traffic of their customers […]

  • 1
  • 2
  • ...
  • 10
  • 11
  • 12
  • 13

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Cisco fixed critical ISE flaws allowing Root-level remote code execution

    Security / June 26, 2025

    U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

    Security / June 26, 2025

    CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

    Hacking / June 26, 2025

    Hackers deploy fake SonicWall VPN App to steal corporate credentials

    Hacking / June 25, 2025

    Mainline Health Systems data breach impacted over 100,000 individuals

    Data Breach / June 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT