• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Drone

Pierluigi Paganini January 03, 2022
Israeli Media Outlets hacked on the anniversary of Soleimani killing

Threat actors hacked the website of Jerusalem Post and the Twitter account of Maariv outlet on Soleimani killing anniversary. Threat actors have taken over the website of the English-language Jerusalem Post and the Twitter account of Maariv daily newspaper publishing a picture of a fist firing a shell out of a ring with a red stone on a finger toward an […]

Pierluigi Paganini November 06, 2021
A drone was modified to disrupt U.S. Power Grid, says intelligence bulletin

US officials believe that a drone was employed in an attempted attack on a power substation in Pennsylvania last year.  US officials believe threat actors used a drone in an attempted attack on a power substation in Pennsylvania last year. The attackers used a DJI Mavic 2 quadcopter-type drone, with a thick copper wire attached underneath it via […]

Pierluigi Paganini May 02, 2021
Hacking a Tesla Model X with a DJI Mavic 2 drone equipped with a WIFI dongle

A security duo has demonstrated how to hack a Tesla Model X’s and open the doors using a DJI Mavic 2 drone equipped with a WIFI dongle. The scenario is disconcerting, hackers could use a drone to fly on your Tesla Model X and open the doors, a couple of researchers demonstrated. The researchers Kunnamon, […]

Pierluigi Paganini September 29, 2017
FBI Director – Terrorists could launch drone attacks very soon

FBI director Christopher Wray warns of terrorists are planning to use drones in attacks, the threat is considered as imminent. This week, FBI Director Christopher Wray warned Congress that terrorists may use drones in attacks against the United States, the official described the threat as imminent. “We do know that terrorist organizations have an interest in using […]

Pierluigi Paganini August 21, 2017
New Snowden Docs reveal the NSA spy hub Pine Gap in Australia

A news batch of documents leaked by Snowden has revealed a US facility in Australia for covertly monitoring communications and supporting drone missions A news batch of documents leaked by former NSA contractor Edward Snowden has revealed a United States facility located in Australia’s Northern Territory for covertly monitoring wireless communications and supporting US drone […]

Pierluigi Paganini August 16, 2016
The unmanned jihad in the sky

UAV – “Go ahead, look up [points to the sky] … see the drone? No? It’s alright, because the drone sees you. Sees your face. We know who you are.” The scene is from the movie “13 hours – The secret story of the soldiers of Benghazi”: as the member of Ansar al-Sharia looks up, […]

Pierluigi Paganini March 12, 2016
The Pentagon used military drones for domestic surveillance

A report published by the DoD Inspector General revealed that military drones have been used for Non-Military domestic Surveillance. The US Government has admitted the use of drones for operations of domestic surveillance. The US Military clarified that all the operations were authorized by a regular warrant confirming that no legal violations were found. The news was revealed by the USA […]

Pierluigi Paganini October 07, 2015
Hacking enterprise wireless Printers with a drone or a vacuum cleaner

A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from outside an office building. Recently I wrote a blog post on the Infosec Institute titled “Modern Physical Security Awareness Is More Than Dumpster Diving” where I explain how the concept of physical security is evolving […]

Pierluigi Paganini September 12, 2015
ISIS hackers violated top secret British Government emails

According to an investigation by the GCHQ intelligence agency ISIS hackers targeted information held by some of David Cameron’s most senior ministers. According the experts at the British Intelligence GCHQ, ISIS hackers intercept top secret British Government emails. The investigation conducted by the GCHQ allowed the British intelligence to uncover a serious breach, terrorists linked […]

Pierluigi Paganini August 31, 2015
Jihadist hacker Junaid Hussain Killed in a targeted air strike

The jihadist hacker Junaid Hussain was killed this week in a US targeted air strike in Syria. The man was actively recruiting ISIS sympathizers. A spokesman for the US Central Command, Colonel Patrick Ryder, confirmed that the jihadist hacker Junaid Hussain was killed in a targeted air strike on August 24 in Raqqa, Syria. Colonel […]

  • 1
  • 2
  • 3

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

    Uncategorized / July 11, 2025

    U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

    Hacking / July 11, 2025

    UK NCA arrested four people over M&S, Co-op cyberattacks

    Cyber Crime / July 10, 2025

    PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

    Hacking / July 10, 2025

    Qantas data breach impacted 5.7 million individuals

    Data Breach / July 10, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT