I più popolari

L'awareness a fumetti

1 Mar

ePrivacy, il rapporto con la direttiva 2002/58/CE e il GdprNicola Fabiano

Approfondiamo l'iter della proposta di regolamento ue ePrivacy e il suo rapporto con la direttiva attuale, 2022/58, e il Gdpr L'articolo ePrivacy, il rapporto con la direttiva 2002/58/CE e il Gdpr proviene da Agenda Digitale. Read...

By

,

Commenti disabilitati su ePrivacy, il rapporto con la direttiva 2002/58/CE e il GdprNicola Fabiano Read More
1 Mar

China-linked Daxin Malware Targeted Multiple Governments in Espionage AttacksThe Hacker News

A previously undocumented espionage tool has been deployed against selected governments and other critical infrastructure targets as part of a long-running espionage campaign orchestrated by China-linked threat actors since at least 2013. Broadcom's Symantec Threat Hunter team characterized the backdoor, named Daxin,...

By

,

Commenti disabilitati su China-linked Daxin Malware Targeted Multiple Governments in Espionage AttacksThe Hacker News Read More
1 Mar

CISA adds recently disclosed Zimbra bug to its Exploited Vulnerabilities CatalogThe Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities Catalog to include a recently disclosed zero-day flaw in the Zimbra email platform citing evidence of active exploitation in the wild. Tracked as CVE-2022-24682 (CVSS score: 6.1), the issue concerns a cross-site...

By

,

Commenti disabilitati su CISA adds recently disclosed Zimbra bug to its Exploited Vulnerabilities CatalogThe Hacker News Read More
28 Feb

100 Million Samsung Galaxy Phones Affected with Flawed Hardware Encryption FeatureThe Hacker News

A group of academics from Tel Aviv University have disclosed details of now-patched "severe" design flaws affecting about 100 million Android-based Samsung smartphones that could have resulted in the extraction of secret cryptographic keys. The shortcomings are the result of an...

By

,

Commenti disabilitati su 100 Million Samsung Galaxy Phones Affected with Flawed Hardware Encryption FeatureThe Hacker News Read More
28 Feb

Lo scontro cyber tra Russia, Ucraina, Occidente: le diverse tatticheVittorio Alovisi

Attacchi DDoS, campagne di disinformazione e attività distruttive di sabotaggio. L'arsenale russo è variegato, come lo è quello occidentale, che finora si è avvalso della bandiera di anonymous per l'offesa a colpi di defacement, take down e primi data breach....

By

,

Commenti disabilitati su Lo scontro cyber tra Russia, Ucraina, Occidente: le diverse tatticheVittorio Alovisi Read More
28 Feb

Reborn of Emotet: New Features of the Botnet and How to Detect itThe Hacker News

One of the most dangerous and infamous threats is back again. In January 2021, global officials took down the botnet. Law enforcement sent a destructive update to the Emotet's executables. And it looked like the end of the trojan's story.  But...

By

,

Commenti disabilitati su Reborn of Emotet: New Features of the Botnet and How to Detect itThe Hacker News Read More
28 Feb

CISA Warns of High-Severity Flaws in Schneider and GE Digital's SCADA SoftwareThe Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) last week published an industrial control system (ICS) advisory related to multiple vulnerabilities impacting Schneider Electric's Easergy medium voltage protection relays. "Successful exploitation of these vulnerabilities may disclose device credentials, cause a denial-of-service condition, device...

By

,

Commenti disabilitati su CISA Warns of High-Severity Flaws in Schneider and GE Digital’s SCADA SoftwareThe Hacker News Read More