• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw
  • Pro-Russia Killnet group hit Dutch and European hospitals
  • New Prilex PoS Malware evolves to target NFC-enabled credit cards
  • New LockBit Green ransomware variant borrows code from Conti ransomware
  • Nevada Ransomware Has Released Upgraded Locker
  • TrickGate, a packer used by malware to evade detection since 2016
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Breaking News (Page 1160)

Breaking News

GPU-based malware, the evolution of rootkits and keyloggers

Malware developers have presented two proof-of-concept malware, a rootkit and a keylogger, which exploit the GPU of the infected host. Malware authors always demonstrate a great creativity and the ability to propose even more effective solutions, recently...

May 8, 2015  By Pierluigi Paganini   Posted In  Breaking News  Malware 

Traditional crooks and violent offenders are turning to the cybercrime

According to data provided by British law enforcement, at least a 25 percent of organised criminals in the country is converting themselves to cybercrime. Cybercrime is becoming even more attractive to traditional crooks, including violent offenders....

May 7, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Laws and regulations 

RHINEHART, VoiceRT, how NSA converted spoken words into text

A new collection of documents leaked by Snowden revealed how the US intelligence converts spoken conversation in indexable text with RHINEHART and VoiceRT tools. Following the disclosure of Top-secret documents provided by Edward Snowden everyone is aware...

May 7, 2015  By Pierluigi Paganini   Posted In  Breaking News  Intelligence 

New AlphaCrypt ransomware, the new threat in the criminal underground

AlphaCrypt ransomware is a new type of ransomware has been detected by security expert in the wild. The malware is delivered via Angler Exploit kit. Ransomware is among most popular malware families in the criminal underground, recently security...

May 7, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware 

Million WordPress websites vulnerable to DOM-based XSS

Every WordPress Plugin or theme that used the genericons package is potentially vulnerable to a DOM-based XSS vulnerability. Experts at the Sucuri firm have discovered that any WordPress Plugin or theme that leverages theĀ genericonsĀ package is affected...

May 7, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

Canadian users infected by a Mobile ransomware by visiting adult content websites

Canadian mobile users were targeted by the latest variant of the Koler Android mobile ransomware after visiting websites proposing adult content. Once again, visitors of websites proposing adult content are targeted by cyber criminals. Last week a malvertising...

May 6, 2015  By Pierluigi Paganini   Posted In  Breaking News  Malware  Mobile 

Hacking Drug Infusion Pumps, never so easy

Certain versions of common drug infusion pumps are affected by numerous remotely exploitable vulnerabilities that could not open the doors to hackers. We discussed several times about the opportunity toĀ hack medical devicesĀ and the needs of security...

May 6, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Security 

Hacking Military Drones Info Can Be Found on Google

You can find a manual on how to hack drones online, simply searching on Google. This can lead to severe problems and negative consequences. Drones have become truly popular, due to the multiple benefits that they offer. In the military, drones have been...

May 6, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

Uber customers suspect their accounts have been hacked

Many Uber customers are reporting unauthorized rides paid through their accounts, the company excludes a data breach, but suggested a password reset. In March, media agencies reported that the popular Uber service was hacked by cyber criminals, security...

May 5, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 

Rombertik, a complex malware that also wipes hard drive to prevent analysis

Rombertik is the name of a high sophisticated strain of malware spotted by the researcher of the Cisco Talos Team, it wipes hard drive to prevent analysis. Security experts have uncovered new strain of malware dubbed Rombertik malware that implements...

May 5, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware  Security 


« First‹ Previous115611571158115911601161116211631164Next ›Last »
Page 1160 of 1187



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking ā€œAccept Allā€, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version