• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Cisco was hacked by the Yanluowang ransomware gang
  • Risky Business: Enterprises Can’t Shake Log4j flaw
  • Experts found 10 malicious packages on PyPI used to steal developers' data
  • Hackers behind Twilio data breach also targeted Cloudflare employees
  • CISA adds UnRAR and Windows flaws to Known Exploited Vulnerabilities Catalog
  • VMware warns of public PoC code for critical auth bypass bug CVE-2022-31656
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Malware (Page 360)

Malware

Finfisher, the case of a cyber espionage tool found everywhere

Two days ago, reading the news that lawful interception malware FinFisher was discovered in the wild I thought ... "wow finally we have the evidence, probably we will debate for a long time regarding the use of this tool and of similar agents" But...

August 14, 2012  By Pierluigi Paganini   Posted In  Intelligence  Malware  Security 

Gauss, evidence of ongoing cyber-war and cyber espionage campaigns

As expected a new malware for purposes of cyber espionage was once again identified by the Team of Kaspersky Lab. After Duqu, Flame and Mahdi a new cyber-espionage toolkit has been detected in the same region, the Middle East, and like its predecessor...

August 10, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

DaVinci code,the surveillance business & eligibility of investigations

No doubts, one of the most advanced cyber threat to the technological evolution is the malware diffusion, we read daily news regarding new unknown agents developed by cybercriminals, governments or hacktivists, but are we really ready to reduce the exposure...

August 7, 2012  By Pierluigi Paganini   Posted In  Intelligence  Malware  Security 

Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim's PC, but the scenario has completely changed today. While surviving the need of wanting to harm with malicious software, for example in the development of cyber weapons, the current trend is to develop...

August 2, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware  Security 

Rakshasa, is it possible design the perfect hardware backdoor?

Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by cyber criminals and in cyber attacks during state sponsored operations in cyber warfare scenarios. This malicious software presents...

July 31, 2012  By Pierluigi Paganini   Posted In  Hacking  Malware  Security 

New Madi instance and “AC/DC” virus, Middle East as shooting range

The Middle East has always been considered an area of the planet's turbulent for the continuing conflict and political tensions among the states that inhabit it. In the last two years, the tensions seem to have intensified and with it has grown the diffusion...

July 26, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware 

Malware… It’s all about you…

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace The military strategist Carl von Clausewitz stated: “All war presupposes human weakness and seeks to exploit it.” Malicious software...

July 23, 2012  By Pierluigi Paganini   Posted In  Malware 

Kindsight Security report on the growth of malware diffusion

Today I had the opportunity to analyze the a majority-owned subsidiary of Alcatel-Lucent, that shows a worrying scenario, around 14 percent of home networks were infected with malware in the period between  April and June 2012. Researchers declared: "We...

July 21, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Mahdi campaign, ongoing cyber-espionage in the Middle East

Again another great investigation of the excellent team of Kaspersky lab and its partner Seculert firm has discovered an ongoing campaign to conduct a large scale infiltration of computer systems in the Middle East area. The campaign has targeted individuals...

July 18, 2012  By Pierluigi Paganini   Posted In  Intelligence  Malware  Security 

Government cyber strategies to mitigate growing cyber threats

In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber espionage for military or private business, they have demonstrated how much dangerous is a cyber offensive. The U.S.'s leading cyberwarrior...

July 16, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware  Security 


« First‹ Previous356357358359360361362363364Next ›Last »
Page 360 of 369



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT