Pierluigi Paganini

Lebanese Cedar APT group broke into telco and ISPs worldwide

Clearsky researchers linked the Lebanese Cedar APT group to a cyber espionage campaign that targeted companies around the world. Clearsky…

5 years ago

TeamTNT group adds new detection evasion tool to its Linux miner

The TeamTNT cybercrime group has improved its Linux cryptocurrency miner by implementing open-source detection evasion capabilities. The TeamTNT cybercrime group…

5 years ago

LogoKit, a new phishing kit that dynamically creates phishing forms

Researchers from RiskIQ have discovered a new phishing kit dubbed LogoKit that dynamically compose phishing content. Researchers from RiskIQ discovered…

5 years ago

CISA warns of high-severity flaws in Fuji Electric Tellus Lite V-Simulator and Server Lite

The U.S. CISA published a security advisory for High-Severity flaws in some SCADA/HMI products made by Japanese company Fuji Electric.…

5 years ago

Law enforcement announced global action against NetWalker Ransomware

A joint operation of U.S. and EU law enforcement authorities allowed the seizure of the leak sites used by NetWalker…

5 years ago

Emotet Botnet dismantled in a joint international operation

A global operation of law enforcement has dismantled the infrastructure of the infamous Emotet botnet. A global operation of law…

5 years ago

Pwn2Own 2021, more than $1,500,000 in cash and prizes for contestants

Trend Micro’s Zero Day Initiative announced the Pwn2Own Vancouver 2021 hacking competition that will also cover Zoom, MS Teams Exploits.…

5 years ago

Maritime port cybersecurity

Let's talk about cyber risk in the maritime and port setting to better understand Maritime Port cybersecurity. In order to…

5 years ago

Apple addresses three iOS zero-day flaws exploited in the wild

Apple has addressed three zero-day vulnerabilities in its iOS operating system that have been exploited in the wild. Apple has…

5 years ago

Heap-based buffer overflow in Linux Sudo allows local users to gain root privileges

CVE-2021-3156 Sudo vulnerability has allowed any local user to gain root privileges on Unix-like operating systems without authentication. Sudo is one…

5 years ago

This website uses cookies.