I più popolari

L'awareness a fumetti

29 Mar

Privid: A Privacy-Preserving Surveillance Video Analytics SystemThe Hacker News

A group of academics has designed a new system known as "Privid" that enables video analytics in a privacy-preserving manner to combat concerns with invasive tracking. "We're at a stage right now where cameras are practically ubiquitous. If there's a camera...

By

,

Commenti disabilitati su Privid: A Privacy-Preserving Surveillance Video Analytics SystemThe Hacker News Read More
29 Mar

Experts Detail Virtual Machine Used by Wslink Malware Loader for ObfuscationThe Hacker News

Cybersecurity researchers have shed more light on a malicious loader that runs as a server and executes received modules in memory, laying bare the structure of an "advanced multi-layered virtual machine" used by the malware to fly under the radar. Wslink,...

By

,

Commenti disabilitati su Experts Detail Virtual Machine Used by Wslink Malware Loader for ObfuscationThe Hacker News Read More
29 Mar

New Malware Loader 'Verblecon' Infects Hacked PCs with Cryptocurrency MinersThe Hacker News

An unidentified threat actor has been observed employing a "complex and powerful" malware loader with the ultimate objective of deploying cryptocurrency miners on compromised systems and potentially facilitating the theft of Discord tokens. "The evidence found on victim networks appears to...

By

,

Commenti disabilitati su New Malware Loader ‘Verblecon’ Infects Hacked PCs with Cryptocurrency MinersThe Hacker News Read More
29 Mar

Critical Sophos Firewall RCE Vulnerability Under Active ExploitationThe Hacker News

Cybersecurity firm Sophos on Monday warned that a recently patched critical security vulnerability in its firewall product is being actively exploited in real-world attacks. The flaw, tracked as CVE-2022-1040, is rated 9.8 out of 10 on the CVSS scoring system and impacts...

By

,

Commenti disabilitati su Critical Sophos Firewall RCE Vulnerability Under Active ExploitationThe Hacker News Read More
29 Mar

Diritto d’accesso nelle linee guida EDPB: la possibile applicazione a intermediari e delegati dell’interessatoAndrea Michinelli

Il diritto di accesso ai dati interessato è uno dei cardini del Gdpr. Le linee guida dell'Edpb possono fornire una prima risposta ai dubbi sull’attuale compliance in caso di accesso di terzi, come i Personal Information Management Systems (PIMS), cioè...

By

,

Commenti disabilitati su Diritto d’accesso nelle linee guida EDPB: la possibile applicazione a intermediari e delegati dell’interessatoAndrea Michinelli Read More
29 Mar

A Large-Scale Supply Chain Attack Distributed Over 800 Malicious NPM PackagesThe Hacker News

A threat actor dubbed "RED-LILI" has been linked to an ongoing large-scale supply chain attack campaign targeting the NPM package repository by publishing nearly 800 malicious modules. "Customarily, attackers use an anonymous disposable NPM account from which they launch their attacks,"...

By

,

Commenti disabilitati su A Large-Scale Supply Chain Attack Distributed Over 800 Malicious NPM PackagesThe Hacker News Read More
29 Mar

Siti internet e servizi PA: le linee guida Agid occasione importante per la data protectionElio Franco

Le linee guida AgID, una volta aggiornate con le indicazioni del Garante, saranno finalmente occasione per ripensare i processi di ogni PA, sia quelli relativi alle piattaforme digitali che quelli interni, di modo da mettere al centro la tutela dei...

By

,

Commenti disabilitati su Siti internet e servizi PA: le linee guida Agid occasione importante per la data protectionElio Franco Read More