Blog

Attenzione a seguire l’esempio dei VIP, tuteliamo pure sui social la nostra salute – Intervento di Ginevra Cerrina Feroni – Il Messaggero


Attenzione a seguire l'esempio dei VIP, tuteliamo pure sui social la nostra salute Intervento di Ginevra Cerrina Feroni, vice Presidente...

New EnemyBot DDoS Botnet Borrows Exploit Code from Mirai and GafgytThe Hacker News


A threat group that pursues crypto mining and distributed denial-of-service (DDoS) attacks has been linked to a new botnet called...

Rarible NFT Marketplace Flaw Could’ve Let Attackers Hijack Crypto WalletsThe Hacker News


Cybersecurity researchers have disclosed a now-fixed security flaw in the Rarible non-fungible token (NFT) marketplace that, if successfully exploited, could...

Microsoft Disrupts ZLoader Cybercrime Botnet in Global OperationThe Hacker News


Microsoft and a consortium of cybersecurity companies took legal and technical steps to disrupt the ZLoader botnet, seizing control of...

NFT e musica, quindici proposte di tutela intellettuale per un matrimonio feliceMarco Signorelli e Enzo Mazza


È fluido lo scenario degli NFT nel settore musicale, una situazione che comporta rischi per la protezione della proprietà intellettuale...

Critical VMware Workspace ONE Access Flaw Under Active Exploitation in the WildThe Hacker News


A week after VMware released patches to remediate eight security vulnerabilities in VMware Workspace ONE Access, threat actors have begun...