• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 

A ransomware attack pushed the German napkin firm Fasana into insolvency

 | 

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

 | 

China-linked group Salt Typhoon breached satellite firm Viasat

 | 

Iran experienced a near-total national internet blackout

 | 

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

 | 

Healthcare services company Episource data breach impacts 5.4 Million people

 | 

Watch out, Veeam fixed a new critical bug in Backup & Replication product

 | 

U.S. CISA adds Linux Kernel flaw to its Known Exploited Vulnerabilities catalog

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

cyber threat

Pierluigi Paganini April 06, 2012
Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we tend to associate a terrorist act to a physical event as an explosion, a conflict, a tragedy, but the common people totally ignore the potential threat of a cyber offensive. We learned about the devastating […]

Pierluigi Paganini April 05, 2012
Anonymous, its strategy against censorship and the diversionary theory

Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and against which confront. As repeatedly stressed I consider the moment of confrontation with the group a moment of growth for the IT professional in many ways, on all: having to deal with the cyber threat that […]

Pierluigi Paganini April 03, 2012
Cyber Weapons

Article Published on The Hacker New Magazine – April Edition “Cyber_Warfare” First let’s try to provide a definition of cyber-weapon, to do this I get inspiration from an article written by experts Thomas Rid and Peter McBurney. Correctly define cyber weapon has significant legal and political consequences as well as the security itself. The line […]

Pierluigi Paganini April 03, 2012
UPGRADE – VISA, MASTERCARD and GPN breach

The day is come, yesterday morning as planned Global Payments Inc., the Atlanta-based credit and debit card processor that recently announced a breach that exposed fewer than 1.5 million card accounts, held a conference call to discuss about the breach and its impacts. Again Krebson Security Blog is the more accredited source in my opinion, they […]

Pierluigi Paganini April 02, 2012
Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet Administration. Researchers suspect the involvement of China and on groups of hackers sponsored by the Beijing government. In multiple cases, we have seen how the Chinese government promotes and supports from the economic point of view […]

Pierluigi Paganini April 01, 2012
VISA & MASTERCARD breach raises Security doubts on standard compliance

The Krebs on Security blog reported that there has been a security breach at Global Payments that “may involve more than 10 million compromised card numbers.”  We are facing with a massive breach that could impact more over 10 million compromised card numbers, for this reason VISA and MasterCard are alerting banks across US about […]

Pierluigi Paganini March 29, 2012
Duqu – Cyber weapons factory still operating … it’s just the beginning

We all remember the decision of the western states to prohibit the sale of anti-virus systems to Tehran, penalties determined to thwart the development of Iran’s nuclear program. A predictable decision that haven’t created any problem the state that seems has developed a new antivirus program to immunize the systems from the notorious Stuxnet virus. […]

Pierluigi Paganini March 28, 2012
Japan and the privacy contradictions

The massive use of new technologies has often raised thorny questions about the privacy of network users. The most difficult issue to resolve in the necessary to reach a compromise to assure the users requirements of security and privacy. The debate generates heated arguments, confusion and sometimes decisions in apparent contrast. In Japan, to the multinational […]

Pierluigi Paganini March 27, 2012
Huawei – Symantec, broken join venture and the fear on chinese firms

Huawei – Symantec joint venture is ended because the US firm feared business repercussion for the collaboration with the Chinese giant It’s official, the joint venture between Symantec and Huawei Technologies is ended because the American IT security firms feared that the collaboration with the Chinese telecommunications producer could have a sensible impact on its business. […]

Pierluigi Paganini March 26, 2012
Reflections on the Zero-Days Exploits market starting from Forbes’s article

The news that I wish discuss was published on the website of Forbes magazine, titled “Shopping For Zero-Days: A Price List For Hackers’ Secret Software Exploits“,  that focuses on the commercial value of the vulnerability of popular applications. Time ago the figure of the hacker was recognized mainly as a researcher interested to measures its skills […]

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    China-linked APT Salt Typhoon targets Canadian Telecom companies

    APT / June 24, 2025

    U.S. warns of incoming cyber threats following Iran airstrikes

    Cyber warfare / June 24, 2025

    McLaren Health Care data breach impacted over 743,000 people

    Data Breach / June 23, 2025

    American steel giant Nucor confirms data breach in May attack

    Data Breach / June 23, 2025

    The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

    Cyber Crime / June 23, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT