• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Cisco addresses flaws in HyperFlex and Prime Infrastructure
  • Expert found a DoS flaw in Windows Servers running IIS
  • Adobe released second fix for the same Adobe Reader flaw
  • Security experts released new GandCrab Decryptor for free
  • Critical bug in WINRAR affects all versions released in the last 19 years
  • CVE-2019-6340 Critical flaw in Drupal allows Remote Code Execution
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Self-propagating ZeuS source code offered for sale in the underground

A new variant of Zeus trojan is offered for sale in the underground. It is a Self-propagating version that exploits Facebook, the RDP and the email. The criminal history taught us that after the diffusion of source code of malicious agent such as the popular...

June 30, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

Stellar Wind, Prism,EvilOlive,ShellTrumpet, US massive surveillance

Stellar Wind, Prism,EvilOlive, ShellTrumpet are the names of some of the US massive surveillance programs revealed recently by the press ... The Guardian published new uncomfortable documents that revealed another surveillance program dubbed Stellar...

June 29, 2013  By Pierluigi Paganini   Posted In  Intelligence  Security 

Opera infrastructure hacked and digital certificate stolen

Opera software revealed that its infrastructure was attacked and a digital certificate has been stolen to sign malware and to deceive victims. On June 19th Opera suffered a cyber attack that was uncovered and contained by the same software company, the news...

June 28, 2013  By Pierluigi Paganini   Posted In  Hacking  Malware 

Facebook hacked with an SMS, excellent the bug management

The hacker "fin1te"  revealed that Facebook account was hackable within a minute simply with an SMS. Excellent the bug management in the Bug Bounty program. Facebook hacked again, this time hackers have done it without using any other malicious code...

June 27, 2013  By Pierluigi Paganini   Posted In  Digital ID  Hacking 

Comment Crew, China-based group of hackers is changing tactics

Chinese hackers Comment Crew is changing tactics, security firms suspected it due the analysis of principal cyber espionage campaigns targeted their clients. The Comment Crew is back again, security experts suspect the involvement of the Chinese group...

June 27, 2013  By Pierluigi Paganini   Posted In  Intelligence  Security 

Car hacking, cinematographic fiction or reality

Car hacking is today possible due the massive introduction of technology in our vehicles, a hacker that gain access to our vehicles. Car hacking is one of the effect of the massive introduction of technology in our vehicles, a hacker that gain access...

June 26, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Attacks-as-a-Service, MaaS, FaaS different terms same success history

Attacks-as-a-Service, Malware-as-a-Service and Fraud-as-a-Service, are all terms used to better qualify the complex evolution of cybercrime offer. Attacks-as-a-Service , Malware-as-a-Service and Fraud-as-a-Service are all terms commonly used...

June 25, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Anonymous and state-sponsored hackers threaten energy sector

The energy sector is threaten with increasing frequency by hacktivists, state-sponsored hackers and cybercriminals... The number of cyber attacks against energy sector is increased creating great concerns within the security community. Oil and gas firms...

June 24, 2013  By Pierluigi Paganini   Posted In  Hacking  Malware  Security 

Operation Tempora, massive tapping program conducted by Britain’s GCHQ

Operation Tempora, is the name of GCHQ program to tap fibre-optic cables for secret access to communications. Operation Tempora, this is the name of last massive tapping program conducted by Britain's Government Communications Headquarters (GCHQ) and revealed...

June 23, 2013  By Pierluigi Paganini   Posted In  Intelligence  Security 

Raspberry Pi as physical backdoor to office networks

Network security engineer “Richee” explained how to use a Raspberry Pi to realize a physical backdoor to gain remote access to an office network. Network security engineer “Richee” published an interesting post on how to use a tiny Raspberry...

June 22, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 


12345Next ›Last »
Page 1 of 774
  • Digging the Deep Web: Exploring the dark side of the web

    Digging The Deep Web
  • Sponsored Content

    • +Pierluigi Paganini

      • Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) )Threat Landscape Stakeholder Group, member of Cyber G7 Workgroup of the Italian Ministry of Foreign Affairs and International Cooperation, Director of the Master in Cyber Security at the Link Campus University. He is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine",
  • Yoroi blog

    Yoroi Blog

    Yoroi Blog

  • Sponsored Content

  • Sponsored Content

  • Subscribe Security Affairs Newsletter

    Subscribe to Security Affairs Newsletter

    * indicates required




  • Sponsored Content

  • Sponsored Content



Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More