• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 

A ransomware attack pushed the German napkin firm Fasana into insolvency

 | 

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

China

Pierluigi Paganini August 09, 2014
1million Android devices infected by Xshqi Worm on Chinese Valentine’s day

One million Android devices in China were infected with an Xshqi SMS worm on August 2, the day the country celebrated Valentine’s Day. Experts at Kaspersky Lab revealed that a  malware, dubbed Trojan.AndroidOS.Xshqi.a, infected neatly 500,000 Android devices in just six hours last week in China, but Chinese media provided a more pessimistic estimate declaring that the […]

Pierluigi Paganini August 05, 2014
China bans Symantec & Kaspersky from the list of antivirus suppliers

China has excluded Symantec Corp and Kaspersky Lab from a list of approved antivirus software suppliers to limit the use of foreign technology. Cyber espionage is the first concern of government, China and US exchanged in the months reciprocal accusations on a series of hacking campaign conducted with the purpose of stealing sensitive information. According to the People’s Daily […]

Pierluigi Paganini July 09, 2014
Deep Panda hacking team targeting US experts on Iraq

Researchers at CrowdStrike reveal that hacking team dubbed Deep Panda is targeting US think thank firms with a significant knowledge on the Iraqi situation. CrowdStrike security firm revealed that a group of hackers, suspected to be linked to the Chinese cyber army, began targeting PCs belonging to think thank firms which are analyzing the Iraqi situation. Experts at […]

Pierluigi Paganini June 23, 2014
Largest DDoS attack hit PopVote, Hong Kong Democracy voting site

Largest DDoS attack hit PopVote, Hong Kong Democracy voting website.  Experts at CloudFlare observed a three hundred gigabits per second DDoS attack. The largest ever and most severe Distributed Denial of Service (DDoS) attack in the history has recently hit the online democracy poll promoting opinion on the upcoming Hong Kong elections. The system under attack is […]

Pierluigi Paganini June 11, 2014
Putter Panda APT behind for cyber espionage campaigns, are they members of PLA Unit 61486?

CrowdStrike published a new report which blames the Chinese Putter Panda group for the different cyber espionage campaigns conducted against foreign companies. Putter Panda is the name of bad actor responsible for a series of cyber espionage operations originating in Shanghai, security experts linked its operation to the activity of the People’s Liberation Army 3rd General Staff […]

Pierluigi Paganini May 29, 2014
Fake Android WeChat app used to spread banking trojan in China

Security experts at Kaspersky Lab have discovered a new banking trojan, dubbed Banker.AndroidOS.Basti.a, hidden in a fake WeChat application. Cyber criminals are abusing of the brand WeChat, the popular mobile application designed by Chinese company Tencent, to arrange a malware campaign which hit Chinese users. Experts at Kaspersky Lab have discovered that cybercriminals are using an […]

Pierluigi Paganini May 25, 2014
FireEye-Mandiant data confirms DOJ’s Findings on APT1

Experts at Mandiant have corroborated the DOJ’s data by releasing additional evidence not included in the original APT1 report. One of the news most important shared on the internet this week it the one related to the indictment announced by US Department of Justice (DOJ) on five members of PLA Unit 61398. One year ago Mandiant experts deeply analyzed […]

Pierluigi Paganini May 21, 2014
Windows 8 banned by China for Government Computers

Chinese Authorities ban the use of Microsoft Windows 8 Operating System for Government Computers, the ban is not extended to private environment. The tension between US and China is increasing, both governments are accusing each other of cyber espionage and both are prohibiting the use of foreign products in the government environment. In the past US […]

Pierluigi Paganini May 17, 2014
Elderwood Platform is still providing Zero-Day exploits

Experts at Symantec have discovered that behind the Elderwood Platform there is a still active group which is providing Zero-Day exploit used recently. Do you remember the Elderwood  project? It was September 2012 when Symantec security firm published an analysis that demonstrate the link between a series of cyber attacks against more than 30 companies and the cyber […]

Pierluigi Paganini May 07, 2014
Disclosed emails reveal assiduous collaboration between Google and NSA

Al Jazeera obtained the emails exchanged between Google executives and former NSA director Alexander which suggest that Google is very close to NSA. The IT Giants Apple, Google and Microsoft always denied any involvement in the surveillance program despite Edward Snowden as produced different documents attesting to the inconvenient truth. Now a new event is shocking the […]

  • 1
  • 2
  • ...
  • 32
  • 33
  • 34
  • 35
  • 36
  • ...
  • 47
  • 48
  • 49

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Hackers deploy fake SonicWall VPN App to steal corporate credentials

    Hacking / June 25, 2025

    Mainline Health Systems data breach impacted over 100,000 individuals

    Data Breach / June 25, 2025

    Disrupting the operations of cryptocurrency mining botnets

    Malware / June 25, 2025

    Prometei botnet activity has surged since March 2025

    Cyber Crime / June 25, 2025

    The U.S. House banned WhatsApp on government devices due to security concerns

    Mobile / June 24, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT