Pierluigi Paganini

European Union simulated a cyber attack on a fictitious Finnish power company

The European Union simulated a cyber attack on a fictitious Finnish power company to test its cyber-defense capabilities. Cyber drills…

4 years ago

A new wave of Qlocker ransomware attacks targets QNAP NAS devices

QNAP NAS devices are under attack, experts warn of a new Qlocker ransomware campaign that hit devices worldwide. A new…

4 years ago

Security Affairs newsletter Round 349

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…

4 years ago

Threat actors stole $18.7M from the Lympo NTF platform

Threat actors hacked the hot wallet of the NFT platform Lympo and managed to steal 165.2 Million LMT (worth $18.7…

4 years ago

Prominent Carding Marketplace UniCC announced it’s shutting down

One of the biggest underground carding marketplaces, UniCC, announced it’s shutting down its operations. UniCC, one of the biggest underground…

4 years ago

One of the REvil members arrested by FSB was behind Colonial Pipeline attack

A senior Biden administration official said that the one of the Russian hacker arrested by FSB was behind the Colonial…

4 years ago

Threat actors defaced Ukrainian government websites

Threat actors defaced multiple Ukrainian government websites after talks between Ukrainian, US, and Russian officials hit a dead this week. Threat…

4 years ago

North Korea-linked APT BlueNoroff focuses on crypto theft

The North Korea-linked APT group BlueNoroff has been spotted targeting cryptocurrency startups with fake MetaMask browser extensions. The North Korea-linked…

4 years ago

Ukrainian police arrested Ransomware gang behind attacks on 50 companies

Ukrainian police arrested members of a ransomware gang that targeted at least 50 companies in the U.S. and Europe. Ukrainian…

4 years ago

Threat actors can bypass malware detection due to Microsoft Defender weakness

A weakness in the Microsoft Defender antivirus can allow attackers to retrieve information to use to avoid detection. Threat actors…

4 years ago

This website uses cookies.