I più popolari

L'awareness a fumetti

28 Feb

Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking MeasuresThe Hacker News

Cybersecurity researchers have managed to build a clone of Apple Airtag that circumvents the anti-stalking protection technology built into its Find My Bluetooth-based tracking protocol. The result is a stealth AirTag that can successfully track an iPhone user for over five...

By

,

Commenti disabilitati su Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking MeasuresThe Hacker News Read More
28 Feb

Come scegliere il software di gestione documentale dopo le nuove linee guida AgidSergio Sette

Quali caratteristiche deve avere un software di gestione documentale per rispettare le nuove Linee guida per la gestione documentale e la conservazione di Agid e, per esempio, passare serenamente dall'archivio cartaceo a quello digitale: ecco tutti i consigli L'articolo Come...

By

,

Commenti disabilitati su Come scegliere il software di gestione documentale dopo le nuove linee guida AgidSergio Sette Read More
28 Feb

Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger APIThe Hacker News

An Iranian geopolitical nexus threat actor has been uncovered deploying two new targeted malware that come with "simple" backdoor functionalities as part of an intrusion against an unnamed Middle East government entity in November 2021. Cybersecurity company Mandiant attributed the attack...

By

,

Commenti disabilitati su Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger APIThe Hacker News Read More
26 Feb

Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft StoreThe Hacker News

A new malware capable of controlling social media accounts is being distributed through Microsoft's official app store in the form of trojanized gaming apps, infecting more than 5,000 Windows machines in Sweden, Bulgaria, Russia, Bermuda, and Spain. Israeli cybersecurity company Check...

By

,

Commenti disabilitati su Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft StoreThe Hacker News Read More
26 Feb

L'Ucraina chiede aiuto agli hacker e Anonymous risponde a modo suo

L’altra fronte, quello informatico. Ecco cosa sta accadendoRead MoreIl Sole 24 ORE - Tecnologia

By

Commenti disabilitati su L’Ucraina chiede aiuto agli hacker e Anonymous risponde a modo suo Read More
26 Feb

Russia-Ukraine War: Phishing, Malware and Hacker Groups Taking SidesThe Hacker News

Ukraine's Computer Emergency Response Team (CERT-UA) has warned of Belarusian state-sponsored hackers targeting its military personnel and related individuals as part of a phishing campaign mounted amidst Russia's military invasion of the country. "Mass phishing emails have recently been observed targeting private 'i.ua'...

By

,

Commenti disabilitati su Russia-Ukraine War: Phishing, Malware and Hacker Groups Taking SidesThe Hacker News Read More
25 Feb

New "SockDetour" Fileless, Socketless Backdoor Targets U.S. Defense ContractorsThe Hacker News

Cybersecurity researchers have taken the wraps off a previously undocumented and stealthy custom malware called SockDetour that targeted U.S.-based defense contractors with the goal of being used as a secondary implant on compromised Windows hosts. "SockDetour is a backdoor that is...

By

,

Commenti disabilitati su New “SockDetour” Fileless, Socketless Backdoor Targets U.S. Defense ContractorsThe Hacker News Read More