• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Must Read

  • Japanese Pharmaceutical giant Eisai hit by a ransomware attack
  • Clop ransomware gang was testing MOVEit Transfer bug since 2021
  • Stealth Soldier backdoor used is targeted espionage attacks in Libya
  • Researchers published PoC exploit code for actively exploited Windows elevation of privilege issue
  • Experts detail a new Kimsuky social engineering campaign
  • German recruiter Pflegia leaks sensitive job seeker info
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Home Archive by category Cyber Crime (Page 375)

Cyber Crime

CenterPOS – The evolution of POS malware

Security Experts at FireEye discovered a new strain of POS malware dubbed CenterPOS that is threatening the retail systems. In the last 2/3 years, we have seen a significant increase in the number of POS malware, their diffusion is becoming even more...

January 29, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware 

Caution, Hackers targeted the cPanel Database

The cPanel Inc. company that manages the popular web hosting account management tool is warning customers about a possible data breach occurred over the weekend. According to the cPanel firm customers' account information may have been compromised,...

January 28, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 

ENISA Threat Landscape 2015, a must reading

ENISA has issued the annual ENISA Threat Landscape 2015 a document that synthesizes the emerging trends in cyber security I'm very happy to announce the publication of the annual ENISA Threat Landscape 2015 (ETL 2015), this is the fifth report issued...

January 28, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Data Breach  Hacking  Reports  Security 

Hackers are blackmailing the creator of Open-Source Ransomware

The Turkish security researcher Utku Sen was blackmailed by hackers behind the Magic ransomware to close his projects. The developers behind the open source-based “Magic” ransomware are blackmailing the creator of Hidden Tear and EDA2 in order...

January 27, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware 

A new wave of attacks linked to the Codoso ATP Group

According to Palo Alto Networks’ Unit 42 the Chinese APT group Codoso has been targeting organizations in various industries in a new wave of cyber attacks. The group of experts at Palo Alto Networks Unit 42 have uncovered a new cyber espionage operation...

January 26, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Security 

A flaw in TeslaCrypt ransomware allows file recovering

The victims of the infamous TeslaCrypt ransomware can now rejoice, there is a free tool to decrypt files encrypted by TeslaCrypt and TeslaCrypt 2.0 TeslaCrypt is one of the most insidious ransomware first detected in the wild in 2015, today I have a good...

January 25, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware 

Operators behind Angler Exploit Kit included CryptoWall 4.0

The latest variant of CryptoWall 4.0, one of the most popular and dangerous ransomware threats, has been recently added to the infamous Angler Exploit Kit. In my 2016 Cyber Security Predictions, I have predicted the criminal practices of the extortion...

January 25, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware 

New RAT Trochilus, a sophisticated weapon used by cyber spies

Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware...

January 23, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Intelligence  Reports  Security 

Crooks steal over $50 million from aircraft systems manufacturer FACC

The Austrian engineering firm FACC which designs Airbus, Boeing aero parts was victim of a significant cyber attack. I always remark the importance of cyber security in a business context, a proper cyber security posture is important like the finances...

January 23, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime 

TorMail hack, FBI surgical operation, or dragnet surveillance?

In 2013 the FBI agents seized TorMail, now new information are emerging on the operations. Someone believes it was a surgical ops others accuse Feds of dragnet surveillance. In 2013 the FBI agents seized TorMail, at the time the most popular dark web email...

January 22, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Laws and regulations 


« First‹ Previous371372373374375376377378379Next ›Last »
Page 375 of 508



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version