• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw
  • Pro-Russia Killnet group hit Dutch and European hospitals
  • New Prilex PoS Malware evolves to target NFC-enabled credit cards
  • New LockBit Green ransomware variant borrows code from Conti ransomware
  • Nevada Ransomware Has Released Upgraded Locker
  • TrickGate, a packer used by malware to evade detection since 2016
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Malware (Page 382)

Malware

Analisys on Flame C&C, the cyber war began long ago

In May Iranian Computer Emergency Response Team Coordination CenterLab,  CrySyS Lab and Kaspersky Lab have published a news regarding a new malware that has been detected and that have hit mainly Windows systems of Middle East area, specifically the Iran. The...

September 18, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

State-sponsored attack or not, that’s the question

The defense of cyberspace is becoming one the most concerning question to approach, governments all around the world are massively investing in cyber technology with the resultants that the number of cyber operations is increasing exponentially. William...

September 18, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines,...

September 17, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Deep Web  Hacking  Intelligence  Malware  Security 

Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or with a cyber scam, malicious agents are around us, they have infected a huge quantity of machines with dramatic consequences. But...

September 16, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Intelligence  Malware  Security 

Cybercrime evolution in North America and Western Europe

Despite cyber space is known as a domain without border an interesting study of the Kaspersky Security firm demonstrates that cyber criminal activities are mainly located in some area of the planet, as we can see also the victims of the attacks have a geographical...

September 13, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber criminals, hacktivist and terrorist are focusing their activities in the new domain due this reason we are assisting to the born of new agents...

September 7, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware  Security 

FireEye Advanced Threat Report…the inadequacy of the defense

The security firm FireEye has released  an interesting report  named “Advanced Threat Report” related first half of 2012 that provides an overview of the current threat landscape, evolving advanced malware and advanced persistent threat (APT) tactics,...

September 4, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Wiper, assumptions and difficulties analyzing a malware

During last April many press agencies and security firms published a story related to the detection of a new malware, named Wiper that attacked computers at businesses throughout Iran. Kaspersky Lab and the International Telecommunications Union (ITU)...

August 31, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 

RasGas, new cyber attack against an energy company

A new strange attack has hit Qatar's natural gas pumper RasGas, like happened to Saudi Aramco company a virus has infected machines of its network. RasGas is a joint venture between Qatar Petroleum and ExxonMobil operating in Qatar that has an annual...

August 31, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Iran suspected for the attack on the Saudi Aramco

Last week it was announced by Saudi Arabia's oil company, Saudi Aramco that its systems and its internal network were victims of a cyber attack. Recently the company has given more info on the incident declaring that the systems are back up after the attack...

August 30, 2012  By Pierluigi Paganini   Posted In  Malware  Security 


« First‹ Previous378379380381382383384385386Next ›Last »
Page 382 of 392



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version