• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • New Linux variant of Clop Ransomware uses a flawed encryption algorithm
  • VMware has no evidence of zero-day exploitation in ESXiArgs ransomware attacks
  • OpenSSH addressed a new pre-auth double free vulnerability
  • Anonymous leaked 128GB of data stolen from Russian ISP Convex revealing FSB's warrantless surveillance
  • Italy, France and Singapore Warn of a Spike in ESXI Ransomware
  • Royal Ransomware adds support for encrypting Linux, VMware ESXi systems
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Reports (Page 10)

Reports

US Govt agencies detail North Korea-linked HIDDEN COBRA malware

The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) released reports on North Korea-linked HIDDEN COBRA malware. The FBI, the US Cyber Command, and the Department of Homeland Security have published...

February 14, 2020  By Pierluigi Paganini   Posted In  APT  Hacking  Malware  Reports 

OT attacks increased by over 2000 percent in 2019, IBM reports

According to IBM, OT attacks increased by over 2000 percent in 2019, most of them involved the Echobot IoT malware. IBM’s 2020 X-Force Threat Intelligence Index report analyzes the threat landscape in 2019, the experts observed a spike in the number...

February 11, 2020  By Pierluigi Paganini   Posted In  Hacking  Internet of Things  Malware  Reports 

Microsoft detects 77,000 active web shells on a daily basis

Microsoft published an interesting report that investigates web shell attacks, the IT giant says it detects 77,000 active web shells daily. According to a report published by Microsoft, the company detects an average of 77,000 active web shells, spreading...

February 5, 2020  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Reports 

Report: Threat of Emotet and Ryuk

Experts at cyber security firm Cypher conducted a study on Portuguese domains during 2019 and concluded that Emotet and Ryuk were the most active threats Emotet, the most widespread malware worldwide and Ryuk, a ransomware type, are growing threats...

January 31, 2020  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Reports 

Cybercrime Statistics in 2019

I'm preparing the slides for my next speech and I decided to create this post while searching for interesting cybercrime statistics in 2020 Cybercrime will cost as much as $6 trillion annually by 2021. The global expense for organizations...

January 18, 2020  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Reports 

A study reveals the list of worst passwords of 2019

Another year is ending and this is the right time to discover which are the worst passwords of 2019 by analyzing data leaked in various data breaches. Independent anonymous researchers, compiled and shared with security firm NordPass a list of 200 most...

December 17, 2019  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Reports 

Group-IB presents its annual report on global threats to stability in cyberspace

Group-IB, has analyzed key recent changes to the global cyberthreat landscape in the “Hi-Tech Crime Trends 2019/2020” report. Group-IB, a Singapore-based cybersecurity company that specializes in preventing cyberattacks, has analyzed key recent...

November 29, 2019  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber Crime  Cyber warfare  Hacking  Malware  Reports 

Kaspersky found dozens of flaws in 4 open-source VNC software

Kaspersky researchers found dozens of flaws in four popular open-source virtual network computing (VNC) systems. Experts from Kaspersky analyzed several different implementations of a remote access system called Virtual Network Computing (VNC) and identified...

November 23, 2019  By Pierluigi Paganini   Posted In  Breaking News  Hacking  ICS-SCADA  Reports  Security 

ENISA publishes a Threat Landscape for 5G Networks

ENISA, the European Union Agency for Cybersecurity publishes a Threat Landscape for 5G Networks, assessing the threats related to the fifth generation of mobile telecommunications networks (5G). ENISA with the support of the Member States, the European...

November 21, 2019  By Pierluigi Paganini   Posted In  Breaking News  Reports  Security 

Experts report a rampant growth in the number of malicious, lookalike domains

Cyber security firm Venafi announced it has uncovered lookalike domains with valid TLS certificates that appear to target major retailers. Venafi, Inc. is a private cybersecurity company that develops software to secure and protect cryptographic keys...

November 18, 2019  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Reports 


« First‹ Previous67891011121314Next ›Last »
Page 10 of 36



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version