I più popolari
Post Recenti
L'awareness a fumetti
Siti internet e servizi PA: le linee guida Agid occasione importante per la data protectionElio Franco
Le linee guida AgID, una volta aggiornate con le indicazioni del Garante, saranno finalmente occasione per ripensare i processi di ogni PA, sia quelli relativi alle piattaforme digitali che quelli interni, di modo da mettere al centro la tutela dei...
New Report on Okta Hack Reveals the Entire Episode LAPSUS$ AttackThe Hacker News
An independent security researcher has shared what's a detailed timeline of events that transpired as the notorious LAPSUS$ extortion gang broke into a third-party provider linked to the cyber incident at Okta in late January 2022.
In a set of screenshots...
Inps corretta su bonus Covid,tribunale Roma condanna Privacy
Annulla multa, pagherà spese. I controlli scoprirono 5 onorevoliRead MoreRSS di - ANSA.it
Of Cybercriminals and IP AddressesThe Hacker News
You don't like having the FBI knocking on your door at 6 am in the morning. Surprisingly, nor does your usual cybercriminal. That is why they hide (at least the good ones), for example, behind layers of proxies, VPNs, or...
Hackers Hijack Email Reply Chains on Unpatched Exchange Servers to Spread MalwareThe Hacker News
A new email phishing campaign has been spotted leveraging the tactic of conversation hijacking to deliver the IceID info-stealing malware onto infected machines by making use of unpatched and publicly-exposed Microsoft Exchange servers.
"The emails use a social engineering technique of conversation hijacking...
Dark pattern, così le aziende ingannano gli utenti: le nuove linee guida EDPBAngela Lo Giudice
I dark pattern inducono gli utenti ad un consenso forzato al trattamento dati, attraverso stratagemmi sui contenuti e sull’interfaccia grafica. Le nuove linee guida EDPB elencano le categorie e gli schemi di utilizzo più diffusi per disincentivarne l’utilizzo: gli esempi,...
'Purple Fox' Hackers Spotted Using New Variant of FatalRAT in Recent Malware AttacksThe Hacker News
The operators of the Purple Fox malware have retooled their malware arsenal with a new variant of a remote access trojan called FatalRAT, while also simultaneously upgrading their evasion mechanisms to bypass security software.
"Users' machines are targeted via trojanized software packages masquerading...








