Pierluigi Paganini

Unknown FinSpy Mac and Linux versions found in Egypt

Experts from Amnesty International uncovered a surveillance campaign that targeted Egyptian civil society organizations with a new version of FinSpy…

5 years ago

Google removes 17 Joker -infected apps from the Play Store

Google removed this week 17 Android apps from its Play Store because they were infected with the Joker (aka Bread)…

5 years ago

Security Affairs newsletter Round 283

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

5 years ago

Apple addresses four vulnerabilities in macOS

Apple this week released security updates to address a total of four vulnerabilities affecting macOS Catalina, High Sierra and Mojave.…

5 years ago

Microsoft took down 18 Azure AD apps used by Chinese Gadolinium APT

Microsoft removed 18 Azure Active Directory applications from its Azure portal that were created by a Chinese-linked APT group Gadolinium.…

5 years ago

A powerful DDoS attack hit Hungarian banks and telecoms services

Hungarian financial institutions and telecommunications infrastructure were hit by a powerful DDoS attack originating from servers in Russia, China and…

5 years ago

Victims of ThunderX ransomware can recover their files for free

Good news for the victims of the ThunderX ransomware, cybersecurity firm Tesorion has released a decryptor to recover their files…

5 years ago

Hackers stole more than $150 million from KuCoin cryptocurrency exchange

Singapore-based cryptocurrency exchange KuCoin disclosed a security breach, hackers stole $150 million from its hot wallets. Singapore-based cryptocurrency exchange KuCoin…

5 years ago

Twitter warns developers of possible API keys leak

Twitter is warning developers that their API keys, access tokens, and access token secrets may have been exposed in a…

5 years ago

Cisco fixes 34 High-Severity flaws in IOS and IOS XE software

Cisco patched 34 high-severity flaws affecting its IOS and IOS XE software, some of them can be exploited by a…

5 years ago

This website uses cookies.