• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

OneClik APT campaign targets energy sector with stealthy backdoors

 | 

APT42 impersonates cyber professionals to phish Israeli academics and journalists

 | 

Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

 | 

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

WhatsApp

Pierluigi Paganini December 22, 2015
How to Crash WhatsApp with simple smileys

The independent researcher  Indrajeet Bhuyan has demonstrated that is possible to crash the popular messaging app Whatsapp by sending crazy smileys. Crash our Friends’ WhatsApp could be quite easy, this is what the independent researcher Indrajeet Bhuyan has demonstrated by sending crazy smileys. Nearly 4000 simple Smileys are enough to crash our friends’ WhatsApp, the trick works on both […]

Pierluigi Paganini October 27, 2015
WhatsApp collects phone numbers, call duration, and a lot of metadata

A group of experts  has conducted a research that demonstrates the type of data that can be gathered through the forensic study of WhatsApp. A new research conducted by forensic researchers at the University of New Haven (F. Karpisek of Brno University of Technology in the Czech Republic, and Ibrahim Baggili and Frank Breitinger, co-directors of the Cyber […]

Pierluigi Paganini October 05, 2015
How to Hack and Decrypt WhatsApp Database on rooted devices

The post includes a detailed procedure to hack and decrypt WhatsApp Database remotely on rooted Android mobile devices. Very Interesting! A few hours ago it has been published an interesting post on “How to Hack and Decrypt WhatsApp Database (Remotely) [ROOT]” that explains how to extract and decrypt WhatsApp database from a rooted Android system. […]

Pierluigi Paganini September 23, 2015
National Encryption Policy draft, everyone is under strict surveillance

The Indian Government plans to release the new National Encryption Policy, a law that seems to be one of the big threat to the Internet freedom. A new problem is worrying the Indian friends, the Government plans to release a new policy, National Encryption Policy’ that seems to presage disappointments for users. Among ugly and questionable issues […]

Pierluigi Paganini September 08, 2015
vCard flaw exposes up to 200 million of WhatsApp Web users

Security experts at Check Point security discovered a flaw in WhatsApp Web that could be exploited by attackers to compromise hundreds of millions users, According to the security firm Check Point a vulnerability in the popular messaging service WhatsApp Web exposes up to 200 million of its users at risk of cyber attack. WhatsApp Web allows […]

Pierluigi Paganini July 11, 2015
UK to ban messaging applications under a new law

In the UK hard times for messaging applications like WhatsApp and Facebook Messenger, the Investigatory Powers Bill, probably will pass in Autumn. We have already discussed the plan of the UK Government to ban principal messaging applications for security reason, the authorities fear that they could be exploited by terrorist groups as a communication channel. Early this […]

Pierluigi Paganini June 21, 2015
Electronic Frontier Foundation – WhatsApp ranked as the worst at protecting users’ privacy

The Electronic Frontier Foundation published the “Who Has Your Back? 2015” report that ranked WhatsApp ranked as the worst in protecting users’ privacy. The Electronic Frontier Foundation has published its annual report “Who Has Your Back? 2015: Protecting Your Data From Government Requests” that analyzes how private companies handlesusers data with specific focus on Government surveillance. “Which […]

Pierluigi Paganini June 05, 2015
How to easily hack a WhatsApp Account?

TheHackerNews has reported a simple trick that allows to hijack a WhatsApp account easily on every mobile platform by knowing the victim’s phone number. The popular mobile messaging app WhatsApp is vulnerable to hijacking exposing hundreds of Millions of users vulnerable to attack. It could be quite easy to take over a WhatsApp account when the attacker […]

Pierluigi Paganini May 29, 2015
MI5 to Google and Whatsapp, hand me your messages

The Conservatives are planning new laws to give MI5 the power to force IT giants to hand over encrypted messages from terror suspects. Potential global terrorism threats are persuading to Conservatives in UK to move the pieces of chess by law; in advance of the world’s biggest internet companies, such as Google, Apple and Facebook […]

Pierluigi Paganini February 09, 2015
WhatsSpy Public tool can spy on Whatsapp users

WhatsSpy Public is a web-based tool that could allow an attacker to access Whatsapp user information related to his activity. WhatsSpy Public is a web-based tool created by Maikel Zweerink that can trace the moves of a WhatsApp user. WhatsSpy is able to display user information in a friendly dashboard that includes events being displayed […]

  • 1
  • 2
  • ...
  • 4
  • 5
  • 6
  • 7
  • 8

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    OneClik APT campaign targets energy sector with stealthy backdoors

    Hacking / June 27, 2025

    APT42 impersonates cyber professionals to phish Israeli academics and journalists

    APT / June 27, 2025

    Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

    Cyber Crime / June 26, 2025

    Cisco fixed critical ISE flaws allowing Root-level remote code execution

    Security / June 26, 2025

    U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

    Security / June 26, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT