I più popolari
Post Recenti
L'awareness a fumetti
New Hacking Campaign by Transparent Tribe Hackers Targeting Indian OfficialsThe Hacker News
A threat actor of likely Pakistani origin has been attributed to yet another campaign designed to backdoor targets of interest with a Windows-based remote access trojan named CrimsonRAT since at least June 2021.
"Transparent Tribe has been a highly active APT...
Privid: A Privacy-Preserving Surveillance Video Analytics SystemThe Hacker News
A group of academics has designed a new system known as "Privid" that enables video analytics in a privacy-preserving manner to combat concerns with invasive tracking.
"We're at a stage right now where cameras are practically ubiquitous. If there's a camera...
Experts Detail Virtual Machine Used by Wslink Malware Loader for ObfuscationThe Hacker News
Cybersecurity researchers have shed more light on a malicious loader that runs as a server and executes received modules in memory, laying bare the structure of an "advanced multi-layered virtual machine" used by the malware to fly under the radar.
Wslink,...
New Malware Loader 'Verblecon' Infects Hacked PCs with Cryptocurrency MinersThe Hacker News
An unidentified threat actor has been observed employing a "complex and powerful" malware loader with the ultimate objective of deploying cryptocurrency miners on compromised systems and potentially facilitating the theft of Discord tokens.
"The evidence found on victim networks appears to...
Critical Sophos Firewall RCE Vulnerability Under Active ExploitationThe Hacker News
Cybersecurity firm Sophos on Monday warned that a recently patched critical security vulnerability in its firewall product is being actively exploited in real-world attacks.
The flaw, tracked as CVE-2022-1040, is rated 9.8 out of 10 on the CVSS scoring system and impacts...
Diritto d’accesso nelle linee guida EDPB: la possibile applicazione a intermediari e delegati dell’interessatoAndrea Michinelli
Il diritto di accesso ai dati interessato è uno dei cardini del Gdpr. Le linee guida dell'Edpb possono fornire una prima risposta ai dubbi sull’attuale compliance in caso di accesso di terzi, come i Personal Information Management Systems (PIMS), cioè...
A Large-Scale Supply Chain Attack Distributed Over 800 Malicious NPM PackagesThe Hacker News
A threat actor dubbed "RED-LILI" has been linked to an ongoing large-scale supply chain attack campaign targeting the NPM package repository by publishing nearly 800 malicious modules.
"Customarily, attackers use an anonymous disposable NPM account from which they launch their attacks,"...








