• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Cisco addresses flaws in HyperFlex and Prime Infrastructure
  • Expert found a DoS flaw in Windows Servers running IIS
  • Adobe released second fix for the same Adobe Reader flaw
  • Security experts released new GandCrab Decryptor for free
  • Critical bug in WINRAR affects all versions released in the last 19 years
  • CVE-2019-6340 Critical flaw in Drupal allows Remote Code Execution
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Android Firefox Zero-Day exploit available on the underground

A researcher at Malwarebytes has discovered that a Russian hacker recently released an Android Firefox Zero-Day exploits on the underground. A new Android Firefox Zero-Day Exploit is available on the underground market for sale, a Russian exploit...

September 14, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware 

Cybercrime: Africa need a defense
 system

Africa ’s banking industry, tourism sector and plenty of other businesses are prone to cyber-related crime hence the urgent need to develop a defense system A good number of stakeholders and Internet Service Providers in Africa warned for the last...

September 13, 2013  By Pierluigi Paganini   Posted In  Cyber Crime 

PHP SuperGlobal variables gaining popularity within hacking community

Imperva security researchers observed Web attacks involving PHP SuperGlobal variables are gaining popularity within the hacking community. Security researchers sounded the alarm for the possible abuse of PHP SuperGlobal variables by attackers, it is very...

September 12, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Kaspersky reveals Kimsuky operation that is targeting South Korea

After months of investigation security researchers from Kaspersky have detected a new cyber espionage campaign dubbed Kimsuky that targeted South Korean organizations. Kaspersky experts have discovered a new cyber espionage campaign dubbed Kimsuky...

September 11, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Malware  Security 

Group-IB Threat Intelligence Report 2012–2013 H1, a must read

Group-IB Threat Intelligence Report 2012–2013 H1 is an excellent analysis on the state and dynamics of today’s market of computer crimes and cyber threats. Group-IB has recently issued an interesting report titled "Group-IB Threat Intelligence Report...

September 11, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

A look to Android offer in the underground mobile market

Security experts continues to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile market. In the last months security firms have observed an increase in criminal activities that...

September 10, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Surveillance – NSA can access data on your mobile device

The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range of mobile devices including Android, iPhone and BlackBerry. Here we are with weekly news on NSA surveillance activities,...

September 9, 2013  By Pierluigi Paganini   Posted In  Hacking  Intelligence  Security 

Mevade botnet responsible for the spike in Tor traffic

Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in the anonymizing network. Is the Mevade malware the real responsible for the spike observed in the number of users...

September 8, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

NSA Bullrun program, encryption and false perception of security

Revelations on Bullrun program demonstrated that NSA has capabilities against widely-used online protocols such as HTTPS and encryption standards. The latest nightmare for US Administration is named Bullrun, another US program for massive surveillance. Snowden's...

September 7, 2013  By Pierluigi Paganini   Posted In  Intelligence  Security 

Hesperbot, the new powerful banking trojan found by ESET

Hesperbot is the name of a new banking trojan detected by ESET, it is a very potent malware which includes some very advanced tricks. Hesperbot is the name of the last banking trojan detected by security firm ESET, a malware that due its effectiveness...

September 6, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 


12345Next ›Last »
Page 1 of 774
  • Digging the Deep Web: Exploring the dark side of the web

    Digging The Deep Web
  • Sponsored Content

    • +Pierluigi Paganini

      • Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) )Threat Landscape Stakeholder Group, member of Cyber G7 Workgroup of the Italian Ministry of Foreign Affairs and International Cooperation, Director of the Master in Cyber Security at the Link Campus University. He is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine",
  • Yoroi blog

    Yoroi Blog

    Yoroi Blog

  • Sponsored Content

  • Sponsored Content

  • Subscribe Security Affairs Newsletter

    Subscribe to Security Affairs Newsletter

    * indicates required




  • Sponsored Content

  • Sponsored Content



Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More