• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Cisco was hacked by the Yanluowang ransomware gang
  • Risky Business: Enterprises Can’t Shake Log4j flaw
  • Experts found 10 malicious packages on PyPI used to steal developers' data
  • Hackers behind Twilio data breach also targeted Cloudflare employees
  • CISA adds UnRAR and Windows flaws to Known Exploited Vulnerabilities Catalog
  • VMware warns of public PoC code for critical auth bypass bug CVE-2022-31656
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Malware (Page 359)

Malware

Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber criminals, hacktivist and terrorist are focusing their activities in the new domain due this reason we are assisting to the born of new agents...

September 7, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware  Security 

FireEye Advanced Threat Report…the inadequacy of the defense

The security firm FireEye has released  an interesting report  named “Advanced Threat Report” related first half of 2012 that provides an overview of the current threat landscape, evolving advanced malware and advanced persistent threat (APT) tactics,...

September 4, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Wiper, assumptions and difficulties analyzing a malware

During last April many press agencies and security firms published a story related to the detection of a new malware, named Wiper that attacked computers at businesses throughout Iran. Kaspersky Lab and the International Telecommunications Union (ITU)...

August 31, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 

RasGas, new cyber attack against an energy company

A new strange attack has hit Qatar's natural gas pumper RasGas, like happened to Saudi Aramco company a virus has infected machines of its network. RasGas is a joint venture between Qatar Petroleum and ExxonMobil operating in Qatar that has an annual...

August 31, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Iran suspected for the attack on the Saudi Aramco

Last week it was announced by Saudi Arabia's oil company, Saudi Aramco that its systems and its internal network were victims of a cyber attack. Recently the company has given more info on the incident declaring that the systems are back up after the attack...

August 30, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Malware, a cyber threat increasingly difficult to contain

Article published on Hakin9 IT Security Magazine - August 2012 When we speak about malware we introduce one of the worst cyber threat that daily evolve with the capacity to hit every sector without distinction. The world “malware” is really...

August 24, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Crisis malware threatens the virtualized environments

This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of new fraud schemas based on malicious software diffusion. Many experts use to avoid malware diffusion making risky navigation and operations...

August 23, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

New raise of Citadel malware…banking again under attack

The FBI has launched an alert titled "Citadel Malware Continues to Deliver Reveton Ransomware in Attempts to Extort Money " One of the sectors most targeted by cyber attacks and by malware is the banking, during the last months we have read several times...

August 22, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Shamoon Malware, cyber espionage tool, cyber weapon or …

Shamoon is a new threat that scares security experts, it is able to destroy files on victim’s PC and overwrite the master boot record of its disks. The cyberspace has no peace, every time a malware or a botnet is detected and neutralized a new cyber...

August 19, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Botnet around us, are we nodes of the Matrix?

Article Published on The Hacker New Magazine – August Edition “Botnet” Introduction The nightmare of millions of infected computers synchronized to conduct an attack on specific target finds materialization in the concept of botnet. In the classic...

August 17, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware  Security 


« First‹ Previous355356357358359360361362363Next ›Last »
Page 359 of 369



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT