I più popolari
Post Recenti
Garante Protezione dei Dati Personali
L'awareness a fumetti
CISA Adds Single-Factor Authentication to the List of Bad PracticesThe Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added single-factor authentication to the short list of "exceptionally risky" cybersecurity practices that could expose critical infrastructure as well as government and the private sector entities to devastating cyberattacks.
Single-factor authentication is a method of...
Cyberbullismo: pagina informativa per spiegare ai ragazzi come difendersi
La pagina informativa messa a disposizione dalla Autorità Garante per la Protezionde dei dati peraonali, per spiegare ai ragazzi come difendersiRead More
Microsoft Warns of Widespread Phishing Attacks Using Open RedirectsThe Hacker News
Microsoft is warning of a widespread credential phishing campaign that leverages open redirector links in email communications as a vector to trick users into visiting malicious websites while effectively bypassing security software.
"Attackers combine these links with social engineering baits that impersonate well-known...
LockFile Ransomware Bypasses Protection Using Intermittent File EncryptionThe Hacker News
A new ransomware family that emerged last month comes with its own bag of tricks to bypass ransomware protection by leveraging a novel technique called "intermittent encryption."
Called LockFile, the operators of the ransomware have been found exploiting recently disclosed flaws such...
Get Lifetime Access to 24 Professional Cybersecurity Certification Prep CoursesThe Hacker News
Not all heroes wear capes. Cybersecurity professionals are digital warriors who use their knowledge and skill to battle malicious hackers.
Sounds like an exciting career, right?
If the comic-book comparisons aren’t working for you, perhaps some figures will. According to ZipRecruiter, the...
Researchers Uncover FIN8's New Backdoor Targeting Financial InstitutionsThe Hacker News
A financially motivated threat actor notorious for setting its sights on retail, hospitality, and entertainment industries has been observed deploying a completely new backdoor on infected systems, indicating the operators are continuously retooling their malware arsenal to avoid detection and...
Preventing your Cloud 'Secrets' from Public Exposure: An IDE plugin solutionThe Hacker News
I'm sure you would agree that, in today's digital world, the majority of applications we work on require some type of credentials – to connect to a database with a username/password, to access computer programs via authorized tokens, or API...














