• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • NON-STATE ACTORS IN THE CYBERSPACE: AN ATTEMPT TO A TAXONOMIC CLASSIFICATION, ROLE, IMPACT AND RELATIONS WITH A STATE’S SOCIOECONOMIC STRUCTURE
  • LockBit 3.0 introduces important novelties, including a bug bounty program
  • Latest OpenSSL version is affected by a remote memory corruption flaw
  • Two critical flaws affect CODESYS ICS Automation Software
  • The government of Lithuania confirmed it had been hit by an intense cyberattack
  • New Matanbuchus Campaign drops Cobalt Strike beacons
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "watering hole"

watering hole

Sophisticated attackers used DazzleSpy macOS backdoor in watering hole attacks

Experts found an undocumented macOS backdoor, dubbed DazzleSpy, that was employed...

January 25, 2022  By Pierluigi Paganini

macOS Zero-Day exploited in watering hole attacks on users in Hong Kong

Google revealed that threat actors recently exploited a zero-day vulnerability...

November 12, 2021  By Pierluigi Paganini

Sophisticated hacking campaign uses Windows and Android zero-days

Google Project Zero researchers uncovered a sophisticated hacking campaign...

January 12, 2021  By Pierluigi Paganini

Operation Poisoned News: Hong Kong iOS users targeted with watering hole attacks

Operation Poisoned News - Experts observed a campaign aimed at infecting...

March 26, 2020  By Pierluigi Paganini

Hackers used Scanbox framework to hack Pakistani Govt’s passport application tracking site

Experts uncovered a watering hole attack against the Pakistani Govt’s...

March 18, 2019  By Pierluigi Paganini

Cyber mercenaries and insiders hired by Chinese intelligence to hack aerospace and tech firms

According to the U.S. Department of Justice, the Chinese intelligence...

October 31, 2018  By Pierluigi Paganini

China-linked Emissary Panda APT group targets National Data Center in Asia

A China-linked APT group, LuckyMouse, Emissary Panda, APT27 and Threat...

June 14, 2018  By Pierluigi Paganini

North Korea-linked Andariel APT Group exploited an ActiveX Zero-Day in recent attacks

A North Korea-linked APT group, tracked as  Andariel Group, leveraged...

June 1, 2018  By Pierluigi Paganini

Experts uncovered a watering hole attack on leading Hong Kong Telecom Site exploiting CVE-2018-4878 flaw

Researchers at Morphisec have uncovered a watering hole attack on leading...

March 27, 2018  By Pierluigi Paganini

BitDefender found the first MAC OS version of the X-Agent used by the APT28

Security experts at Bitdefender discovered a MAC OS version of the X-Agent...

February 15, 2017  By Pierluigi Paganini


12345
Page 1 of 5


Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT