• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Palo Alto Networks warns of Reflected Amplification DoS issue in PAN-OS
  • Ex Twitter employee found guilty of spying for Saudi Arabian government
  • Cisco fixed a flaw in ASA, FTD devices that can give access to RSA private key
  • Cisco was hacked by the Yanluowang ransomware gang
  • Risky Business: Enterprises Can’t Shake Log4j flaw
  • Experts found 10 malicious packages on PyPI used to steal developers' data
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 373)

Cyber Crime

Security Affairs newsletter Round 13– Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. The silent war between black markets in the deep web US Air Force located an ISIS command...

June 14, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Digital ID  Intelligence  Malware 

Exploring the Hacker’s List marketplace, 23% are FB hacking

An interesting overview of the hacking services offered by the platform Hacker’s List reveals that hacking Facebook accounts is the most common request. Last week the colleagues at The Hacker News explained how to exploit a simple trick to take...

June 13, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 

Dark Web – Agora users targeted by a hacking campaign

Users of the popular Agora Dark Market have been targeted by unknown crooks who sent them malicious java script exploit that tries to steal their Bitcoin. Users of the popular Agora Marketplace have been targeted by unknown crooks who sent them malicious...

June 12, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime 

Law enforcement dismantled gang behind Operation Triangle Phishing Campaign

A joint international operation led to the dismantling of a criminal gang who is behind the Operation Triangle phishing campaign. A joint effort of Law enforcement from six countries, including Italy, Spain, Poland,Belgium, the U.K., and Georgia, allowed...

June 12, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime 

Bundestag may need to replace 20,000 computers after the hack

German media states that Bundestag may need to replace 20,000 computers after the recent attack, an operation that could cost millions Euro. A few days ago the experts the German Government has confirmed that hackers who breached the Bundestag systems...

June 11, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Intelligence 

Duqu 2.0 the most sophisticated threat ever seen targeted also Kaspersky

Threat actors used a Duqu 2.0 worm in a series of attacks worldwide that also breached the systems at Kaspersky Lab. It is most complex malware ever seen. A new powerful strain of Duqu malware, dubbed Duqu 2.0, appeared in the wild after going dark...

June 10, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Hacking  Intelligence  Malware 

MEDIJACK – How cyber criminals violate health care systems

TrapX, a renowned security providing delivery of deception based cybersecurity  defense uncovered a security flaw in medical field dubbed as medical device hijack, or simply put MEDIJACk. The flaw can allow attackers to exploit main healthcare systems...

June 8, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Tox ransomware platform builder is now available for sale

The owner of the Tox ransomware builder is offering for sale the platform worried by its popularity. He confirmed that he will pay ransoms to his customers. The owner of the famous Tox ransomware has decided that it was time to sell the platform, this...

June 8, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware 

MalumPoS PoS malware used against Hotels and other Industries

Malware researchers at Trend Micro have discovered a news strain of the malumPoS used to target hospitality, food and beverage, and retail industries. Security experts at Trend Micro have discovered a new strain of the MalumPoS malware that was reconfigured...

June 8, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware 

A quick tour in the hacking black market

A quick tour in the Black Markets, the places on the web where it is possible to acquire or rent “malicious” services and illegal products. Black Markets are places on the web where it is possible to acquire or rent “malicious” services and products,...

June 7, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 


« First‹ Previous369370371372373374375376377Next ›Last »
Page 373 of 465



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT