• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

 | 

Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

 | 

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

keylogger

Pierluigi Paganini April 17, 2016
American company lost $100 million to BEC fraud

US prosecutors confirmed on Thursday that an American firm lost nearly $100 million in a BEC (business email compromise) scam. The Reuters Agency reported that an unidentified American company was the victim of a clamorous email fraud, scammers have stolen from the firm nearly $100 million. According to the US authorities, fraudsters used a fake […]

Pierluigi Paganini March 20, 2016
Olympic Vision BEC attacks target businesses worldwide with keyloggers

Trend Micro discovered a Business Email Compromise Campaign leveraging on the Olympic Vision keylogger that targets Middle East and Asia Pacific Companies. A new malware-based campaign is targeting key employees from companies in the US, Middle East and Asia. The attackers are using malware in a classic business email compromise (BEC) attack in order to […]

Pierluigi Paganini November 08, 2015
Malvertising attack hit The Economist, anti-ad blocking service PageFair hacked

PageFair, the anti-ad blocking analytics service used by The Economist’s was hacked on Halloween and the attackers used it to serve malware. On Halloween, hackers have compromised the anti-ad blocking service PageFair used by The Economist exposing readers to malware infections. PageFair allows publishers to measure how many visitors block their ads, users who visited The […]

Pierluigi Paganini July 27, 2015
FireEye report on TTPs of Nigerian a 419 scammers group

FireEye published a report on the operations of a group of 419 scammers located in Nigeria, which is using malware as a component of their fraud scams. Security firm FireEye has published a new report on a new group of 419 scammers that is using keyloggers and other malware to implement its fraud scheme. According to the investigators, the fraudsters diverted potentially millions […]

Pierluigi Paganini May 08, 2015
GPU-based malware, the evolution of rootkits and keyloggers

Malware developers have presented two proof-of-concept malware, a rootkit and a keylogger, which exploit the GPU of the infected host. Malware authors always demonstrate a great creativity and the ability to propose even more effective solutions, recently developers have published two strains of malware, Jellyfish rootkit and the Demon keylogger, that implement an unusual way to run on a victim’s […]

Pierluigi Paganini April 19, 2015
Punkey, a new POS Malware in the criminal ecosystem

During a recent investigation the experts at Trustwave encountered a new strain of POS malware dubbed Punkey which presents interesting features. Malware researchers at Trustwave have detected a new point of sale (PoS) malware dubbed Punkey that was used by criminal crews to compromise payment systems of some organisations. The experts discovered Punkey during a law […]

Pierluigi Paganini January 28, 2015
Regin and Qwerty keylogger are linked with Five Eyes Intelligence

Experts at Kaspersky Lab compared the Regin module 50251 and the “Qwerty” keylogger discovering that they share part of the source code and functionality. Malware researchers at Kaspersky Lab have uncovered a link between the Regin malware platform and the attack platform cited in the last collection of documents published by Edward Snowden to Der Spiegel magazine. The experts have discovered […]

Pierluigi Paganini July 14, 2014
Feds issue advisory on keylogger in hotel business centers

US Secret Service and the NCCIC have alerted hoteliers about a potential presence of keyloggers in the machines provided to guests in hotel business centers. US Secret Service and the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC) have issued a non-public security advisory in the hospitality industry to warn on the activities of cyber […]

Pierluigi Paganini June 22, 2014
RSA – Malware proposal on the open web increasingly fearless

The RSA Research Team has discovered the offer of a complete collection of malware through open channels like social media and emails. RSA Research has recently published an interesting update on the underground sale of malware tool, the experts have discovered a server who is offering a set of spyware tools for sale under the […]

Pierluigi Paganini February 04, 2014
Screenlogging malware can log swipe gestures on your mobile

Security researcher Neal Hindocha has developed a Screenlogging malware that logs finger swipes on smart devices in combination with taking screenshots. Pattern lock are not enough to protect our Smartphone because  hackers are able to log swipe gestures with a malware. The news was reported by Forbes, Neal Hindocha, a senior security consultant for Trustwave, has designed a Screenlogging malware that can […]

  • 1
  • 2
  • 3

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

    Malware / July 27, 2025

    Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / July 27, 2025

    Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

    Cyber Crime / July 26, 2025

    Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

    Intelligence / July 26, 2025

    Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

    Intelligence / July 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT