Pierluigi Paganini

DOJ takes action against 22-year-old running RapperBot Botnet

DOJ charges 22-year-old Ethan Foltz of Oregon for running RapperBot, a DDoS botnet behind 370K+ attacks in 80+ countries since…

6 months ago

Google fixed Chrome flaw found by Big Sleep AI

Google Chrome 139 addressed a high-severity V8 flaw, tracked as CVE-2025-9132, found by Big Sleep AI Google Chrome 139 addressed…

6 months ago

Pharmaceutical firm Inotiv discloses ransomware attack. Qilin group claims responsibility for the hack<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

Pharmaceutical firm Inotiv says a ransomware attack encrypted systems and data, disrupting operations, according to its SEC filing. U.S. pharmaceutical…

6 months ago

A hacker tied to Yemen Cyber Army gets 20 months in prison

UK hacker Al-Tahery Al-Mashriky, tied to Yemen Cyber Army, gets 20 months in prison for website defacements and stolen data…

6 months ago

Exploit weaponizes SAP NetWeaver bugs for full system compromise

Exploit chaining CVE-2025-31324 & CVE-2025-42999 in SAP NetWeaver enables auth bypass and RCE, risking compromise and data theft. A new…

6 months ago

Noodlophile Stealer evolution

Noodlophile malware spreads via copyright phishing, targeting firms in the U.S., Europe, Baltics & APAC with tailored spear-phishing lures. The…

6 months ago

Allianz Life security breach impacted 1.1 million customers

Allianz Life breach exposed data of most of its 1.4M customers; HIBP lists 1.1M impacted, though the insurer hasn’t confirmed…

6 months ago

Analyzing evolution of the PipeMagic malware<gwmw style="display:none;"></gwmw>

Hackers exploited Windows flaw CVE-2025-29824 to deploy PipeMagic malware in RansomExx attacks, Kaspersky revealed. A joint report from Kaspersky and BI.ZONE analyzed the evolution…

6 months ago

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog. The U.S.…

6 months ago

AI for Cybersecurity: Building Trust in Your Workflows

In cybersecurity, speed matters, but trust is crucial. AI must ensure both rapid response and reliable decisions to avoid errors…

6 months ago

This website uses cookies.