Remove Cybercrime Remove DDOS Remove Spyware Remove Surveillance
article thumbnail

Security Affairs newsletter Round 377

Security Affairs

Greek intelligence service used surveillance malware to spy on a journalist, Reuters reports Slack resets passwords for about 0.5% Greek intelligence service used surveillance malware to spy on a journalist, Reuters reports Slack resets passwords for about 0.5%

Spyware 123
article thumbnail

Security Affairs newsletter Round 429 by Pierluigi Paganini – International edition

Security Affairs

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

DDOS 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 438 by Pierluigi Paganini – International edition

Security Affairs

0-days exploited by commercial surveillance vendor in Egypt PREDATOR IN THE WIRES OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes Cybersecurity Apple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?

article thumbnail

Security Affairs newsletter Round 458 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Gov imposes visa restrictions on individuals misusing Commercial Spyware HPE is investigating claims of a new security breach Experts warn of a surge of attacks targeting Ivanti SSRF flaw How to hack the Airbus NAVBLUE Flysmart+ Manager Crooks stole $25.5

Spyware 93
article thumbnail

Security Affairs newsletter Round 354

Security Affairs

If you want to also receive for free the newsletter with the international press subscribe here.

Banking 84
article thumbnail

What is Malware? Definition, Purpose & Common Protections

eSecurity Planet

From ransomware attacks locking businesses out of their data until they pay potentially millions of dollars to spyware tracking users’ every move through their infected device, the effects of malware can be devastating. Types of spyware are often classified based on what information they’re gathering. Need More Intel on Rootkits?

Malware 69
article thumbnail

Advanced threat predictions for 2024

SecureList

This politician became the target of a previously undiscovered “zero-day” attack aimed at infecting his phone with spyware. A creative avenue for threat actors is to expand their surveillance efforts to include devices such as smart home cameras, connected car systems and beyond.

Hacking 102