Pierluigi Paganini

Security Affairs newsletter Round 325

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…

5 years ago

Threat actors leaked data stolen from EA, including FIFA code

Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure…

5 years ago

SolarWinds hackers breached 27 state attorneys’ offices

Microsoft Office 365 email accounts of employees at 27 US Attorneys' offices were breached by the Russia-linked SVR group as part of…

5 years ago

Android Banking Trojan Vultur uses screen recording for credentials stealing

Experts spotted a new strain of Android banking Trojan dubbed Vultur that uses screen recording and keylogging for the capturing…

5 years ago

CVE-2021-3490 – Pwning Linux kernel eBPF on Ubuntu machines

Researcher published an exploit code for a high-severity privilege escalation flaw (CVE-2021-3490) in Linux kernel eBPF on Ubuntu machines. The…

5 years ago

Estonia ‘s police arrested a Tallin resident who stole 286K ID scans from a government DB

Estonia 's police arrested a man from Tallinn that is suspected to be the hacker who stole 286K ID scans…

5 years ago

Meteor was the wiper used against Iran’s national railway system

The recent attack against Iran’s national railway system was caused by a wiper malware dubbed Meteor and not by a ransomware as initially thought.…

5 years ago

LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains

A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers…

5 years ago

Critical flaw in Microsoft Hyper-V could allow RCE and DoS

Experts disclose details about a critical flaw in Microsoft Hyper-V, tracked as CVE-2021-28476, that can allow executing arbitrary code on…

5 years ago

US, UK, and Australian agencies warn of top routinely exploited issues

A joint report published by US, UK, and Australian cyber security agencies warns of the top routinely exploited vulnerabilities in…

5 years ago

This website uses cookies.