I più popolari
Post Recenti
Garante Protezione dei Dati Personali
L'awareness a fumetti
New Report on Okta Hack Reveals the Entire Episode LAPSUS$ AttackThe Hacker News
An independent security researcher has shared what's a detailed timeline of events that transpired as the notorious LAPSUS$ extortion gang broke into a third-party provider linked to the cyber incident at Okta in late January 2022.
In a set of screenshots...
Inps corretta su bonus Covid,tribunale Roma condanna Privacy
Annulla multa, pagherà spese. I controlli scoprirono 5 onorevoliRead MoreRSS di - ANSA.it
Of Cybercriminals and IP AddressesThe Hacker News
You don't like having the FBI knocking on your door at 6 am in the morning. Surprisingly, nor does your usual cybercriminal. That is why they hide (at least the good ones), for example, behind layers of proxies, VPNs, or...
Hackers Hijack Email Reply Chains on Unpatched Exchange Servers to Spread MalwareThe Hacker News
A new email phishing campaign has been spotted leveraging the tactic of conversation hijacking to deliver the IceID info-stealing malware onto infected machines by making use of unpatched and publicly-exposed Microsoft Exchange servers.
"The emails use a social engineering technique of conversation hijacking...
Dark pattern, così le aziende ingannano gli utenti: le nuove linee guida EDPBAngela Lo Giudice
I dark pattern inducono gli utenti ad un consenso forzato al trattamento dati, attraverso stratagemmi sui contenuti e sull’interfaccia grafica. Le nuove linee guida EDPB elencano le categorie e gli schemi di utilizzo più diffusi per disincentivarne l’utilizzo: gli esempi,...
'Purple Fox' Hackers Spotted Using New Variant of FatalRAT in Recent Malware AttacksThe Hacker News
The operators of the Purple Fox malware have retooled their malware arsenal with a new variant of a remote access trojan called FatalRAT, while also simultaneously upgrading their evasion mechanisms to bypass security software.
"Users' machines are targeted via trojanized software packages masquerading...
Synthetic data: a cosa servono e come generarli con le Privacy Enhancing TechnologiesErnesto Covello
I synthetic data si generano da dati originali ma non sono dati anonimi: la bozza di Regolamento europeo AI li distingue anche dai dati personali. Cosa sono, perché si usano, qual è la differenza tra anonimizzazione, pseudonimizzazione e minimizzazione, i...








