• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • CISA announced the Pre-Ransomware Notifications initiative
  • China-linked hackers target telecommunication providers in the Middle East
  • City of Toronto is one of the victims hacked by Clop gang using GoAnywhere zero-day
  • Critical flaw in WooCommerce Payments plugin allows site takeover
  • Pwn2Own Vancouver 2023 Day 2: Microsoft Teams, Oracle VirtualBox, and Tesla hacked
  • A million at risk from user data leak at Korean beauty platform PowderRoom
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Cyber espionage campaign against Americans news agencies – NYT

The news is sensational as granted one of the most important journal, the New York Times has announced that during the last months it was victim of cyber espionage coordinated by Chinese hackers probably state-sponsored attackers. The attacks happened...

February 1, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking 

How PokerAgent botnet has stolen Facebook credentials

We never tire of repeating, social networks are an ideal conduit, due their large diffusion, for the spread of malware, they are used by cybercrime to realize complex fraud schema and by military to conduct offensive operations or cyber espionage campaigns. ESET...

January 31, 2013  By Pierluigi Paganini   Posted In  Malware  Security  Social Networks 

Security flaws in Universal Plug and Play expose million devices

Rapid7 security firm has published an interesting whitepaper entitled “Security Flaws in Universal Plug and Play” in which reports the result of a research conducted in the second half of 2012 that evaluated the global exposure of UPnP-enabled network...

January 30, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

How the US are preparing to cyber warfare?

Every government conscious of strategic importance of cyber security and of the investments of other countries in cyber warfare capability is improving its effort. Last week I wrote about Russian government and the Putin's request to reinforce the garrison...

January 29, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Security 

The case of SSH backdoor built in Barracuda Networks products

The worst nightmare for security experts, a backdoor hidden in large consume products, once again has become reality, several network appliances from Barracuda Networks Inc. contains a hidden hardware backdoor that allow to attackers to remotely control...

January 28, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Dissecting a mobile malware

The capillary diffusion of mobile devices, the lack of security systems on these platforms and low level of awareness on principal cyber threats made them a privileged target for cybercrime. We have assisted in the recent year to an explosion of malware...

January 28, 2013  By Pierluigi Paganini   Posted In  Malware 

#OpLastResort & #OpBigBrother, Anonymous against governments

Someone early this year said the hacktivism phenomena and its symbol Anonymous, will exhausted its strength, sincerely I was shocked by this affirmation because I believe that is not possible to stop an ideology and hacktivism is a form to express the dissent...

January 27, 2013  By Pierluigi Paganini   Posted In  Security 

Gozi.3 men,1M computers infected, Millions $ stolen

The news is sensational US authorities blamed 3 individuals of a large scale malware-based attack against banking world, the trojan infected at least one million computers stealing millions of dollars. The three are the Russian Nikita Kuzmin (25 year...

January 26, 2013  By Pierluigi Paganini   Posted In  Malware 

The rise of exploit kits according to Solutionary SERT

Today I desire to discuss about a very interesting study by Solutionary's Security Engineering Research Team (SERT) that shared the results related an analysis on malware and exploit kits diffusion observed with its solution ActiveGuard service platform. The...

January 25, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

DARPA on Cyber Targeted-Attack Analyzer program & micro-satellites

Protect the country, population and assets from cyber threats, this is a must for every government, a challenge for  every state, new processes, large investment and innovative researches are the topics most debated in this period. Yesterday I wrote...

January 24, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Security 


12345Next ›Last »
Page 1 of 1426
  • Digging the Deep Web: Exploring the dark side of the web

    Digging The Deep Web
  • Center for Cyber Security and International Relations Studies

  • Subscribe Security Affairs Newsletter

    newsletter
  • Security Affairs Awarded as Best European Tech blog at European Cybersecurity Blogger Awards

    EU Sec Bloggers Awards 22

Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version