I più popolari
Post Recenti
L'awareness a fumetti
Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking MeasuresThe Hacker News
Cybersecurity researchers have managed to build a clone of Apple Airtag that circumvents the anti-stalking protection technology built into its Find My Bluetooth-based tracking protocol.
The result is a stealth AirTag that can successfully track an iPhone user for over five...
Come scegliere il software di gestione documentale dopo le nuove linee guida AgidSergio Sette
Quali caratteristiche deve avere un software di gestione documentale per rispettare le nuove Linee guida per la gestione documentale e la conservazione di Agid e, per esempio, passare serenamente dall'archivio cartaceo a quello digitale: ecco tutti i consigli
L'articolo Come...
Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger APIThe Hacker News
An Iranian geopolitical nexus threat actor has been uncovered deploying two new targeted malware that come with "simple" backdoor functionalities as part of an intrusion against an unnamed Middle East government entity in November 2021.
Cybersecurity company Mandiant attributed the attack...
Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft StoreThe Hacker News
A new malware capable of controlling social media accounts is being distributed through Microsoft's official app store in the form of trojanized gaming apps, infecting more than 5,000 Windows machines in Sweden, Bulgaria, Russia, Bermuda, and Spain.
Israeli cybersecurity company Check...
L'Ucraina chiede aiuto agli hacker e Anonymous risponde a modo suo
L’altra fronte, quello informatico. Ecco cosa sta accadendoRead MoreIl Sole 24 ORE - Tecnologia
Russia-Ukraine War: Phishing, Malware and Hacker Groups Taking SidesThe Hacker News
Ukraine's Computer Emergency Response Team (CERT-UA) has warned of Belarusian state-sponsored hackers targeting its military personnel and related individuals as part of a phishing campaign mounted amidst Russia's military invasion of the country.
"Mass phishing emails have recently been observed targeting private 'i.ua'...
New "SockDetour" Fileless, Socketless Backdoor Targets U.S. Defense ContractorsThe Hacker News
Cybersecurity researchers have taken the wraps off a previously undocumented and stealthy custom malware called SockDetour that targeted U.S.-based defense contractors with the goal of being used as a secondary implant on compromised Windows hosts.
"SockDetour is a backdoor that is...










