I più popolari
Post Recenti
L'awareness a fumetti
Log4Shell-like Critical RCE Flaw Discovered in H2 Database ConsoleThe Hacker News
Researchers have disclosed a security flaw affecting H2 database consoles that could result in remote code execution in a manner that echoes the Log4j "Log4Shell" vulnerability that came to light last month.
The issue, tracked as CVE-2021-42392, is the " first critical...
France Fines Google, Facebook €210 Million Over Privacy Violating Tracking CookiesThe Hacker News
The Commission nationale de l'informatique et des libertés (CNIL), France's data protection watchdog, has slapped Facebook (now Meta Platforms) and Google with fines of €150 million ($170 million) and €60 million ($68 million) for violating E.U. privacy rules by failing...
Quanto (e come) ci spia lo smartphone? Tutte le trappole che ignoriamoNicola Ruggiero
Non tutti sanno che il giroscopio elettronico e l’accelerometro contenuti nei nostri dispositivi sono quelli che contribuiscono di più a tracciare il profilo di utilizzo del telefono e rappresentato una backdoor per la privacy delle persone. E non c’è solo...
North Korean Hackers Start New Year with Attacks on Russian Foreign MinistryThe Hacker News
A North Korean cyberespionage group named Konni has been linked to a series of targeted attacks aimed at the Russian Federation's Ministry of Foreign Affairs (MID) with New Year lures to compromise Windows systems with malware.
"This activity cluster demonstrates the...
Green pass base per i negozi, la protesta di Confcommercio
"Occorrerà contenere l'impatto organizzativo di un improprio ruolo di controllo e verifica da parte degli esercenti"Read MoreRSS di - ANSA.it
NIST Cybersecurity Framework: A Quick Guide for SaaS Security ComplianceThe Hacker News
When I want to know the most recently published best practices in cyber security, I visit The National Institute of Standards and Technology (NIST). From the latest password requirements (NIST 800-63) to IoT security for manufacturers (NISTIR 8259), NIST is...
New Trick Could Let Malware Fake iPhone Shutdown to Spy on Users SecretlyThe Hacker News
Researchers have disclosed a novel technique by which malware on iOS can achieve persistence on an infected device by faking its shutdown process, making it impossible to physically determine if an iPhone is off or otherwise.
The discovery — dubbed "NoReboot"...








