“La protezione dati: da 25 anni la bussola del futuro”. Convegno in occasione delle Celebrazioni per i 25 anni del Garante – Il 4 luglio a Torino

"LA PROTEZIONE DATI: DA 25 ANNI LA BUSSOLA DEL FUTURO" Convegno in occasione delle Celebrazioni per i 25 anni del Garante per la protezione dei dati personali 4 luglio 2022 Torino, Palazzo Reale - Salone delle Guardie Svizzere Ore 8,30-18,00 Dirett...Read MoreGarante Protezione dei...

Read more...

Google Analytics, possiamo usarlo ancora: ecco come, nel rispetto della privacyAngela Lo Giudice

Quello del Garante Privacy non è un divieto assoluto a Google Analytics, ma una sospensione di 90 giorni del trasferimento dati, per trovare meccanismi che non violino il Gdpr. Soluzioni che esistono sia a livello normativo che tecnico e che dovrebbero consentire a GA4 di poter essere utilizzato. Ecco quali...

Read more...

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware AttackThe Hacker News

A suspected ransomware intrusion against an unnamed target leveraged a Mitel VoIP appliance as an entry point to achieve remote code execution and gain initial access to the environment. The findings come from cybersecurity firm CrowdStrike, which traced the source of the attack to a Linux-based Mitel VoIP device sitting on the network...

Read more...

Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit SpywareThe Hacker News

A week after it emerged that a sophisticated mobile spyware dubbed Hermit was used by the government of Kazakhstan within its borders, Google said it has notified Android users of infected devices. Additionally, necessary changes have been implemented in Google Play Protect — Android's built-in malware defense service — to protect all users,...

Read more...

Multiple Backdoored Python Libraries Caught Stealing AWS Secrets and KeysThe Hacker News

Researchers have discovered a number of malicious Python packages in the official third-party software repository that are engineered to exfiltrate AWS credentials and environment variables to a publicly exposed endpoint. The list of packages includes loglib-modules, pyg-modules, pygrata, pygrata-utils, and hkg-sol-utils, according to Sonatype security researcher Ax Sharma. The packages and...

Read more...

State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage AttacksThe Hacker News

A China-based advanced persistent threat (APT) group is possibly deploying short-lived ransomware families as a decoy to cover up the true operational and tactical objectives behind its campaigns. The activity cluster, attributed to a hacking group dubbed Bronze Starlight by Secureworks, involves the deployment of post-intrusion ransomware such as LockFile, Atom Silo, Rook,...

Read more...