• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Orchard botnet uses Bitcoin Transaction info to generate DGA domains
  • Twilio discloses data breach that impacted customers and employees
  • LogoKit update – The phishing kit leveraging Open Redirect Vulnerabilities
  • Attackers abuse open redirects in Snapchat and Amex in phishing attacks
  • Microsoft is blocking Tutanota email addresses from registering a MS Teams account
  • Serious cyberattack hits German Chambers of Industry and Commerce (DIHK)
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Reports (Page 8)

Reports

ENISA published “Proactive detection – Measures and information sources” report

EU Agency for Cybersecurity ENISA has published a new report of the proactive detection of incidents, including measures and information sources. The EU Agency for Cybersecurity ENISA has published a new report and accompanying repository on measures...

May 31, 2020  By Pierluigi Paganini   Posted In  Breaking News  Reports  Security 

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Group-IB, a Singapore-based cybersecurity company, observed the growth of the lifespan of phishing attacks in the second half of 2019. This trend, revealed by Group-IB’s Computer Emergency Response Team (CERT-GIB), resulted in the tremendous...

May 8, 2020  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Reports 

Europol analyses on criminal operations in Europe during COVID-19 Crisis

Threat actors and criminal organizations continue to take advantage of the COVID-19 pandemic to make money, Europol warns. Europol published a report that highlights how criminals organizations are adapting their operations attempting to take advantage...

May 1, 2020  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Reports  Security 

NSA and ASD issue a report warning of web shells deployments

A joint report released by the U.S. NSA and the Australian Signals Directorate (ASD) warns of attackers increasingly exploiting vulnerable web servers to deploy web shells. A joint report published by the U.S. National Security Agency (NSA) and the Australian...

April 24, 2020  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Reports  Security 

Healthcare sector targeted : what you need to know about the hackers very unusual strategy

Orange Cyberdefense’s Epidemiology Lab has published a report on cyberattacks targeting the healthcare sector. While COVID-19 infections around the world are exploding, cyber threat actors are trying to capitalise on this global health crisis by creating...

March 21, 2020  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Reports 

Most ransomware attacks take place outside the working hours

Most of the ransomware attacks targeting the enterprises occur outside working hours, during the nighttime or during the weekend. Security experts from FireEye published an interesting report on the Ransomware deployment trends, it revealed that most...

March 17, 2020  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Reports 

Most of the attacks on Telecom Sector in 2019 were carried out by China-linked hackers

China-linked cyber espionage groups increasingly targeted organizations in the telecommunications industry in 2019. According to the CrowdStrike 2020 Global Threat Report, the telecommunications and government sectors were the most targeted by the threat...

March 5, 2020  By Pierluigi Paganini   Posted In  APT  Cyber warfare  Hacking  Malware  Reports 

Which are the most dangerous mobile app stores online?

An interesting report published by RiskIQ on 2019 Mobile App Threat Landscape, lists the most dangerous mobile app store online. Mobile users downloaded over 200 billion apps in 2019 and the overall expense in app stores worldwide has been estimated...

February 28, 2020  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Malware  Mobile  Reports 

FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019

FireEye’s report revealed that the incident response division Mandiant observed more than 500 new malware families in 2019. According to the FireEye Mandiant M-Trends 2020 report, FireEye analyzed 1.1 million malware samples per day in 2019 and identified...

February 24, 2020  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Malware  Reports 

Dragos Report: Analysis of ICS flaws disclosed in 2019

More than 400 flaws affecting industrial control systems (ICS) were disclosed in 2019, more than 100 were zero-day vulnerabilities. According to a report published by Dragos, the experts analyzed 438 ICS vulnerabilities that were reported in 212 security...

February 21, 2020  By Pierluigi Paganini   Posted In  Breaking News  ICS-SCADA  Reports 


« First‹ Previous456789101112Next ›Last »
Page 8 of 35



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT