• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Rooster Teeth Productions suffered a payment card breach
  • New Orleans hit by ransomware, US cities continues to be under attack
  • Flaws in Siemens SPPA-T3000 control system expose power plants to hack
  • SEC Charges Shopin Founder with fraud over unregistered $42M ICO
  • A flaw in outdated versions of Beaver Builder and Elementor plugins allows hacking WordPress sites
  • VISA warns of cyber attacks on PoS systems of fuel dispenser merchants
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "spam campaign"

spam campaign

Facebook dismantled a huge spam campaign leveraging bogus accounts

Facebook disrupted an international spam campaign leveraging on bogus accounts...

April 16, 2017  By Pierluigi Paganini

Malicious spam campaign capitalizes the global interest in the Zika virus

The cybercrime ecosystem is getting ready to exploit the media attention...

February 20, 2016  By Pierluigi Paganini

Espionage campaign relying on the Zeus Trojan targets the Israeli Public Sector

Check Point discovered a series of malware-based attacks on Israeli public...

October 14, 2015  By Pierluigi Paganini

VBA malware on the rise, a threat wrongly underestimated

Security experts at Sophos have detected a surge in cyber attacks based...

September 23, 2014  By Pierluigi Paganini




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled