I più popolari

L'awareness a fumetti

26 Ott

Malicious Firefox Add-ons Block Browser From Downloading Security UpdatesThe Hacker News

Mozilla on Monday disclosed it blocked two malicious Firefox add-ons installed by 455,000 users that were found misusing the Proxy API to impede downloading updates to the browser. The two extensions in question, named Bypass and Bypass XM, "interfered with Firefox...

By

,

Commenti disabilitati su Malicious Firefox Add-ons Block Browser From Downloading Security UpdatesThe Hacker News Read More
26 Ott

Green Pass nella PA, ecco i controlli: problemi e impatti privacyChiara Ponti

A una settimana di distanza dal DPCM del 12 di ottobre, le PA stanno effettuando i controlli del Green Pass, alla luce delle note linee guida. Vediamo come sta andando, tra problemi e criticità, viste e vissute anche con una...

By

,

Commenti disabilitati su Green Pass nella PA, ecco i controlli: problemi e impatti privacyChiara Ponti Read More
25 Ott

Hardware-grade enterprise authentication without hardware: new SIM security solution for IAMThe Hacker News

The average cost of a data breach, according to the latest research by IBM, now stands at USD 4.24 million, the highest reported. The leading cause? Compromised credentials, often caused by human error. Although these findings continue to show an upward...

By

,

Commenti disabilitati su Hardware-grade enterprise authentication without hardware: new SIM security solution for IAMThe Hacker News Read More
25 Ott

New Attack Let Attacker Collect and Spoof Browser's Digital FingerprintsThe Hacker News

A "potentially devastating and hard-to-detect threat" could be abused by attackers to collect users' browser fingerprinting information with the goal of spoofing the victims without their knowledge, thus effectively compromising their privacy. Academics from Texas A&M University dubbed the attack system...

By

,

Commenti disabilitati su New Attack Let Attacker Collect and Spoof Browser’s Digital FingerprintsThe Hacker News Read More
25 Ott

Violazioni di dati, se la minaccia viene dall’interno: come limitare i danniAntonio Guzzo e Achille Pierre Paliotta

La minaccia umana è un elemento centrale nell’attuale panorama delle minacce cibernetiche, eppure ci si concentra poco su questo aspetto, considerato come un pericolo minore. Come incorporare questi vettori di minacce nei piani di gestione del rischio organizzativo? Ecco le...

By

,

Commenti disabilitati su Violazioni di dati, se la minaccia viene dall’interno: come limitare i danniAntonio Guzzo e Achille Pierre Paliotta Read More
25 Ott

Microsoft Warns of Continued Supply-Chain Attacks by the Nobelium Hacker GroupThe Hacker News

Nobelium, the threat actor behind the SolarWinds compromise in December 2020, has been behind a new wave of attacks that compromised 14 downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations, illustrating the adversary's...

By

,

Commenti disabilitati su Microsoft Warns of Continued Supply-Chain Attacks by the Nobelium Hacker GroupThe Hacker News Read More
25 Ott

Hackers Exploited Popular BillQuick Billing Software to Deploy RansomwareThe Hacker News

Cybersecurity researchers on Friday disclosed a now-patched critical vulnerability in multiple versions of a time and billing system called BillQuick that's being actively exploited by threat actors to deploy ransomware on vulnerable systems. CVE-2021-42258, as the flaw is being tracked as,...

By

,

Commenti disabilitati su Hackers Exploited Popular BillQuick Billing Software to Deploy RansomwareThe Hacker News Read More