• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 

A ransomware attack pushed the German napkin firm Fasana into insolvency

 | 

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Critical infrastructures

Pierluigi Paganini December 31, 2011
The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life. As with any other subject there are many and conflicting opinions on what is considered a social revolution. Millions, billions of people who daily exchange thoughts, opinions, images, emotions, anything that makes us feel alive […]

Pierluigi Paganini December 29, 2011
Stuxnet, Duqu and the sons of the “Tilded” platform

We all have heard of Stuxnet viruses, malware that has undoubtedly marked a new era in the field. It is considered by experts the first real cyber weapon developed to infect control systems present in some of Iran’s nuclear facilities. With Stuxnet was, in fact, introduced a new concept of malware, a broad-spectrum deadly weapon […]

Pierluigi Paganini December 24, 2011
Iran, the cyber threat … are we creating a new enemy ?

“Iran, the super power capable of threatening the world”. This is the title of a hypothetical sensationalist article aimed to enhance the computer skills of a nation of which little is known. In recent weeks the strange coincidence of events is helping to fuel this belief that leaving the majority of Western countries perceive these […]

Pierluigi Paganini December 21, 2011
Malware attacks Georgia Hospital, have we learnt the lesson?

The medical industry is historically one of the sectors that has benefited more than others for the introduction of technology. Devices allow ever more complex operations every day to millions of patients and to medical equipments, from health conditions monitoring to remote surgery. Informations systems manage massive amounts of sensitive information, making them available to […]

Pierluigi Paganini December 19, 2011
Duqu – The worst may still have to come for critical infrastructures

Duqu, a name that we are reading since several months and with whom we have called a malware that scares the scientific community for some features we will shortly describe. I wrote a lot in this blog about Duqu and on more than one occasion we have raised doubts about the genesis of the agent. […]

Pierluigi Paganini December 18, 2011
SCADA and vulnerabilities to critical infrastructures

Over the last few months there have been different events that led to the story than they can be dangerous attacks on SCADA systems used to control production processes in industrial plants of various kinds, from industrial production to the provision of electricity supply or water. The concern is high, it could materialize the nightmare […]

Pierluigi Paganini December 12, 2011
From the mosaic theory to the stuxnet case

With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation. A natural extension of the method hit its application to ordinary life. Mosaic theory involves collecting information from different sources, public and private, to calculate the value of security. The key concept is the collection and […]

Pierluigi Paganini December 09, 2011
Top Nine cyber security trends for 2012? They are too few, isn’t it?

In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year.  Please carefully read the entire article, first we discuss the nine threats that worry Imperva, then I will introduce the most dangerous threats from my point of view. Do not spend days where you do not hear of cyber threats, risks and possible defense strategies implemented. Governments but […]

Pierluigi Paganini December 06, 2011
How much cost malware production? Which are the processes for the production of virus? (Part.2)

Here I am, as promised, to continue the research started together regarding the cost of malware. Reading news of more or less aggressive viruses that cause many damages to public infrastructure to private citizens and sometimes endangering human life itself. But when we are dealing with someone that has different works and that has no […]

Pierluigi Paganini December 05, 2011
“Cyber India” lights and shadows of the country full of contradictions

The Economy of India is the ninth largest in the world by nominal GDP and the fourth largest by purchasing power parity (PPP). The country is a part of the G-20 major economies, Goldman Sachs predicts that “from 2007 to 2020, India’s GDP per capita in US$ terms will quadruple”, and that the Indian economy will surpass the United States (in US$) by 2043, this are […]

  • 1
  • 2
  • ...
  • 8
  • 9
  • 10
  • 11

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Hackers deploy fake SonicWall VPN App to steal corporate credentials

    Hacking / June 25, 2025

    Mainline Health Systems data breach impacted over 100,000 individuals

    Data Breach / June 25, 2025

    Disrupting the operations of cryptocurrency mining botnets

    Malware / June 25, 2025

    Prometei botnet activity has surged since March 2025

    Cyber Crime / June 25, 2025

    The U.S. House banned WhatsApp on government devices due to security concerns

    Mobile / June 24, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT