• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • VMware warns of public PoC code for critical auth bypass bug CVE-2022-31656
  • Microsoft Patch Tuesday for August 2022 fixed actively exploited zero-day
  • Experts linked Maui ransomware to North Korean Andariel APT
  • Chinese actors behind attacks on industrial enterprises and public institutions
  • US sanctioned crypto mixer Tornado Cash used by North Korea-linked APT
  • Malicious file analysis - Example 01
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Hacking

Hacking

Experts linked Maui ransomware to North Korean Andariel APT

Cybersecurity researchers from Kaspersky linked the Maui ransomware to the North Korea-backed Andariel APT group. Kaspersky linked with medium confidence the Maui ransomware operation to the North Korea-backed APT group Andariel, which is considered...

August 9, 2022  By Pierluigi Paganini   Posted In  APT  Breaking News  Hacking  Malware 

Chinese actors behind attacks on industrial enterprises and public institutions

China-linked threat actors targeted dozens of industrial enterprises and public institutions in Afghanistan and Europe. In January 2022, researchers at Kaspersky ICS CERT uncovered a series of targeted attacks on military industrial enterprises and public...

August 9, 2022  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber warfare  Hacking  Intelligence 

Twilio discloses data breach that impacted customers and employees

Communications company Twilio discloses a data breach after threat actors have stolen employee credentials in an SMS phishing attack. Communications company Twilio discloses a data breach, threat actors had access to the data of some of its customers....

August 8, 2022  By Pierluigi Paganini   Posted In  Breaking News  Data Breach  Hacking 

LogoKit update – The phishing kit leveraging Open Redirect Vulnerabilities

LogoKit - Threat actors leveraging Open Redirect Vulnerabilities popular in online services and apps to bypass spam filters in phishing campaigns. Resecurity, Inc. (USA), a Los Angeles-based cybersecurity company providing managed threat detection...

August 8, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Security 

Attackers abuse open redirects in Snapchat and Amex in phishing attacks

Threat actors abuse open redirects on Snapchat and American Express to launch phishing attacks against Microsoft 365 users. Attackers abused open redirects on the websites of Snapchat and American Express as part of a phishing campaign targeting Microsoft...

August 8, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 

Serious cyberattack hits German Chambers of Industry and Commerce (DIHK)

A massive cyberattack hit the website of the German Chambers of Industry and Commerce (DIHK) this week. A massive attack hit the website of the German Chambers of Industry and Commerce (DIHK) forcing the organization to shut down its IT systems as a precautionary...

August 7, 2022  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

Twitter confirms zero-day used to access data of 5.4 million accounts

Twitter confirmed that the recent data breach that exposed data of 5.4 million accounts was caused by the exploitation of a zero-day flaw. At the end of July, a threat actor leaked data of 5.4 million Twitter accounts that were obtained by exploiting...

August 5, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Data Breach  Hacking 

The popularity of Dark Utilities ‘C2-as-a-Service’ rapidly increases

Dark Utilities "C2-as-a-Service" is attracting a growing number of customers searching for a command-and-control for their campaigns. The popularity of the Dark Utilities "C2-as-a-Service" is rapidly increasing, over 3,000 users are already...

August 5, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web  Hacking  Malware 

DHS warns of critical flaws in Emergency Alert System encoder/decoder devices

The U.S. DHS warns of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. The Department of Homeland Security (DHS) warned of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder...

August 5, 2022  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Security 

Mysterious threat actor TAC-040 used previously undetected Ljl Backdoor

A threat actor, tracked as TAC-040, exploited Atlassian Confluence flaw CVE-2022-26134 to deploy previously undetected Ljl Backdoor. Cybersecurity firm Deepwatch reported that a threat actor, tracked as TAC-040, has likely exploited the CVE-2022-26134...

August 5, 2022  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Malware 


12345Next ›Last »
Page 1 of 728



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT