I più popolari
Post Recenti
Garante Protezione dei Dati Personali
L'awareness a fumetti
Researchers Discover Microsoft-Signed FiveSys Rootkit in the WildThe Hacker News
A newly identified rootkit has been found with a valid digital signature issued by Microsoft that's used to proxy traffic to internet addresses of interest to the attackers for over a year targeting online gamers in China.
Bucharest-headquartered cybersecurity technology company...
P.A: linee guida, smart work ruoti, lavoro prevalente sia in presenza
Lo si legge nelle linee guida presentate oggi dal ministro della Pubblica amministrazione Renato Brunetta ai sindacati. Previste 11 ore di fascia di disconnessioneRead MoreRSS di - ANSA.it
Imprese e privacy, Garante: "A tre anni da Gdpr sta cambiando l'approccio al trattamento dati" - Intervista ad Agostino Ghiglia - IlSole24Ore
Before and After a Pen Test: Steps to Get Through ItThe Hacker News
An effective cybersecurity strategy can be challenging to implement correctly and often involves many layers of security. Part of a robust security strategy involves performing what is known as a penetration test (pen test). The penetration test helps to discover...
SIAE: Garante privacy, aperta un’istruttoria su data breach
SIAE: Garante privacy, aperta un’istruttoria su data breach In relazione al data breach subìto dalla Siae, il Garante per la protezione dei dati personali informa di aver aperto un’istruttoria. La Società italiana autori ed editori aveva ieri notific...Read MoreGarante...
Product Overview: Cynet SaaS Security Posture Management (SSPM)The Hacker News
Software-as-a-service (SaaS) applications have gone from novelty to business necessity in a few short years, and its positive impact on organizations is clear. It’s safe to say that most industries today run on SaaS applications, which is undoubtedly positive, but...
Bug in Popular WinRAR Software Could Let Attackers Hack Your ComputerThe Hacker News
A new security weakness has been disclosed in the WinRAR trialware file archiver utility for Windows that could be abused by a remote attacker to execute arbitrary code on targeted systems, underscoring how vulnerabilities in such software could beсome a...










