• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Must Read

  • Operation Triangulation: previously undetected malware targets iOS devices
  • California-based workforce platform Prosperix leaks drivers licenses and medical records
  • Apps with over 420 Million downloads from Google Play unveil the discovery of SpinOk spyware
  • BlackCat claims the hack of the Casepoint legal technology platform used by US agencies
  • Widespread exploitation by botnet operators of Zyxel firewall flaw
  • Experts warn of backdoor-like behavior within Gigabyte systems
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Home Archive by category Internet of Things (Page 22)

Internet of Things

WizCase Report: Vulnerabilities found in WD My Book, NetGear Stora, SeaGate Home, Medion LifeCloud NAS

Security researchers from WizCase have discovered several vulnerabilities in WD My Book, NetGear Stora, SeaGate Home, Medion LifeCloud NAS. NAS devices have become the storage device of choice for many small and medium businesses (SMB). They are inexpensive,...

October 21, 2018  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Internet of Things 

Chaining three critical vulnerabilities allows takeover of D-Link routers

Researchers from the Silesian University of Technology in Poland discovered several flaws that could be exploited to take over some D-Link routers. A group of researchers from the Silesian University of Technology in Poland has discovered three vulnerabilities...

October 18, 2018  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Internet of Things 

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates Security experts from security firm SEC Consult have identified over 100 companies that buy and re-brand video surveillance...

October 10, 2018  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Internet of Things 

Expert presented a new attack technique to compromise MikroTik Routers

Experts from Tenable Research have devised a new attack technique to fully compromise MikroTik Routers. MikroTik routers continue to be under attack, and the situation is getting worse because of the availability of a new PoC code. The new attack...

October 8, 2018  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Internet of Things 

Sony Bravia Smart TVs affected by a critical vulnerability

Experts at FortiGuard Labs team discovered three vulnerabilities in eight Sony Bravia smart TVs, one of them rated as critical. Patch management is a crucial aspect for IoT devices, smart objects are surrounding us and represent a privileged target...

October 6, 2018  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Internet of Things 

GhostDNS malware already infected over 100K+ devices and targets 70+ different types of home routers

Security experts from Qihoo 360 NetLab spotted GhostDNS, a malware that already infected over 100K+ devices and targets 70+ different types of routers Security experts from Qihoo 360 NetLab have uncovered an ongoing hacking campaign...

October 1, 2018  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Internet of Things  Malware 

Torii botnet, probably the most sophisticated IoT botnet of ever

Avast spotted a new IoT botnet, tracked as Torii, that appears much more sophisticated and stealth of the numerous Mirai variants previously analyzed. Security researchers spotted a new IoT botnet, tracked as Torii, that appears much more sophisticated...

September 29, 2018  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Internet of Things  Malware 

Sustes Malware: CPU for Monero

Sustes Malware doesn't infect victims by itself, but it is spread via brute-force activities with special focus on IoT and Linux servers. Today I'd like to share a simple analysis based on a fascinating threat that I like to call Sustes (you will see name...

September 20, 2018  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Digital ID  Internet of Things  Malware 

Dissecting the first Gafgyt bot implementing the “VanillaUPX technique”

Experts at the CSE Cybsec Z-Lab have found a Gafgyt variant implementing the VanillaUPX technique recently presented in a cybersecurity conference A new variant of the Gafgyt botnet is spreading in the last hours and experts of the CSE Cybsec Z-Lab...

September 19, 2018  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Internet of Things  Malware  Reports 

Evolution of threat landscape for IoT devices – H1 2018

Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape. What is infecting IoT devices and how? The researchers set up a honeypot to collect data on infected IoT devices, the way threat actors...

September 19, 2018  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Internet of Things  Malware  Reports 


« First‹ Previous181920212223242526Next ›Last »
Page 22 of 37



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version