• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • WhatsApp fixes Face ID and Touch ID authentication bypass
  • Google forgot to tell customers that Nest Hub has a microphone
  • Cisco addresses flaws in HyperFlex and Prime Infrastructure
  • Expert found a DoS flaw in Windows Servers running IIS
  • Adobe released second fix for the same Adobe Reader flaw
  • Security experts released new GandCrab Decryptor for free
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Gnosticplayers round 3 – 92 Million fresh accounts from 8 unreported security breaches available for sale

Gnosticplayers hacker is offering in a third round a new set of databases containing millions of hacked accounts from unreported data breaches. Last week, the hacker who goes by online with the moniker Gnosticplayers disclosed the existence of some massive...

February 19, 2019  By Pierluigi Paganini   Posted In  Breaking News  Data Breach  Deep Web  Hacking 

Expert found privilege escalation issue in LG Device Manager

Security expert discovered a privilege escalation flaw that could be exploited by attackers to elevate permissions to SYSTEM in the LG Device Manager application for LG laptops. A security expert who goes online with the moniker Jackson T. has discovered...

February 19, 2019  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

PoC Exploit Code for recent container escape flaw in runc published online

The Proof-of-concept (PoC) exploit code for a recently discovered vulnerability in runc tracked as CVE-2019-5736 is now publicly available. Last week, Aleksa Sarai, a senior software engineer at SUSE Linux GmbH, disclosed a serious vulnerability...

February 18, 2019  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

ATT&CKized Splunk – Threat Hunting with MITRE’s ATT&CK using Splunk

Most of us know MITRE and the ATT&CK™ framework that they have come up with. What a splendid job they have done for the cyber security community by bringing most of the key attack vectors under an organized framework that segregates these attack...

February 18, 2019  By Pierluigi Paganini   Posted In  Breaking News  Security 

New Trickbot module implements Remote App Credential-Grabbing features

The Trickbot banking trojan continues to evolve, Trend Micro detected a new variant that includes a new module used for Remote App Credential-Grabbing. The infamous Trickbot banking trojan is back, experts at Trend Micro detected a new strain of the malware...

February 18, 2019  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware 

Free Tool: Honey Feed

Cybersecurity expert Marco Ramilli shared another tool of his arsenal that extracts suspicious IPs from undesired connections, his HoneyPots. Hi folks, today I’d like to point you out another tool of mine which extracts suspicious IPs from undesired...

February 18, 2019  By Pierluigi Paganini   Posted In  Breaking News  Malware 

Toyota PASTA Car-Hacking Tool will be soon on GitHub

Toyota plans to release the PASTA (Portable Automotive Security Testbed) Car-Hacking Tool on GitHub next month. Takuya Yoshida from Toyota’s InfoTechnology Center and his colleague Tsuyoshi Toyama are members of a Toyota team that developed the new tool,...

February 18, 2019  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

Windows App runs on Mac to download MacOS malware

Experts at Trend Micro have detected a new strain of MacOS malware that hides inside a Windows executable to avoid detection. Security experts at Trend Micro have spotted a new strain of MacOS malware disguises itself as a Windows executable file...

February 17, 2019  By Pierluigi Paganini   Posted In  Breaking News  Malware 

Facebook login phishing campaign can deceive tech-savvy users

Security experts at Myki have recently discovered a new phishing campaign that could deceive even most tech-savvy users. The technique relies upon the concept of being able to reproduce a social login prompt in a very realistic format inside an HTML...

February 17, 2019  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 

Security Affairs newsletter Round 201 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, "Digging in the Deep Web" is online with a special deal 20% discount Kindle Edition Paper...

February 17, 2019  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 


12345Next ›Last »
Page 1 of 774
  • Digging the Deep Web: Exploring the dark side of the web

    Digging The Deep Web
  • Sponsored Content

    • +Pierluigi Paganini

      • Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) )Threat Landscape Stakeholder Group, member of Cyber G7 Workgroup of the Italian Ministry of Foreign Affairs and International Cooperation, Director of the Master in Cyber Security at the Link Campus University. He is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine",
  • Yoroi blog

    Yoroi Blog

    Yoroi Blog

  • Sponsored Content

  • Sponsored Content

  • Subscribe Security Affairs Newsletter

    Subscribe to Security Affairs Newsletter

    * indicates required




  • Sponsored Content

  • Sponsored Content



Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More