House panel marks up kids digital safety act amid Democrat backlash
Chinese state hackers target telcos with new malware toolkit
A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices.
Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
Fake OpenClaw installers hosted in GitHub repositories and promoted by Microsoft Bing's AI-enhanced search feature instructed users to run commands that deployed information stealers and proxy malware.
FBI investigating hack on its wiretap and surveillance systems: report
Hackers allegedly broke into the FBI’s networks, according to a report by CNN.
New Jersey county says malware attack took down phone lines, IT systems
Italian prosecutors confirm journalist was hacked with Paragon spyware
Italian authorities are making progress in their investigation into a wide-ranging spyware scandal in Italy involving Paragon spyware. But the mystery of who hacked two Italian journalists with Paragon spyware continues.
Wikipedia hit by self-propagating JavaScript worm that vandalized pages
The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis.
Patch, track, repeat: The 2025 CVE retrospective
Thor analyzes CVE data from 2025 and provides recommendations for where and how organizations should strengthen their defenses.
Ukrainian women fleeing war exploited in multimillion-dollar gambling fraud scheme
FBI arrests suspect linked to $46M crypto theft from US Marshals
A U.S. government contractor's son, accused of stealing more than $46 million in cryptocurrency from the U.S. Marshals Service, was arrested Wednesday on the island of Saint Martin.
WordPress membership plugin bug exploited to create admin accounts
Hackers are exploiting a critical vulnerability in the User Registration & Membership plugin, which is installed on more than 60,000 WordPress sites.
Phobos ransomware leader facing 20 years in prison after pleading guilty to hacking charges
Cybercrime e AI: l’attribuzione degli attacchi diventa sempre più difficile
L’adozione crescente dell’intelligenza artificiale generativa nel cybercrime sta modificando in profondità il modo in cui vengono progettati e analizzati gli attacchi informatici. Secondo Kaspersky, uno degli effetti più rilevanti riguarda l’attribuzione delle operazioni malevole: l’AI tende a cancellare le “impronte digitali” degli attaccanti, rendendo molto più difficile collegare un attacco a uno specifico gruppo criminale. …
Neutralizzata Tycoon 2FA, il kit phishing che aggirava l’MFA e compromesso migliaia di account
Questi attacchi informatici, che consentono il takeover completo degli account, possono avere conseguenze devastanti, tra cui attacchi ransomware o la perdita di dati sensibili. Ecco come è stata neutralizzata Tycoon 2FA
La nuova dimensione strategica della sicurezza: oltre il cyber, tra AI e domini immateriali
Dalla Relazione annuale sulla politica dell'informazione per la sicurezza emerge che la sicurezza nazionale non è più definita dalla capacità di risposta a minacce visibili e circoscritte, ma dalla capacità di presidiare domini immateriali: cognitivo, sottomarino e della proprietà intellettuale. Ecco cinque casi di studio di AI applicata a dati OSINT
CTFs Aren't Designed to Train Investigators. Hashclue Is.
Real investigations start with noise, a fragment, a pattern, something that doesn't fit. Almost nothing in the standard training stack teaches you to work that problem. Hashclue is an attempt to build something that does.
Esclusioni e premi assicurativi in rialzo: l’effetto NIS2 e Cyber Resilience Act sulle polizze cyber
I segnali indicano un cambiamento nei criteri di valutazione del rischio: le compagnie sembrano attribuire un peso crescente alla maturità organizzativa e alla qualità dei controlli interni. È in questo scenario che la compliance tende a trasformarsi in parametro di selezione assicurativa. Ecco perché
Google says 90 zero-days exploited in 2025 as commercial vendor activity grows
2026 Browser Data Reveals Major Enterprise Security Blind Spots
The browser is becoming the operating system for modern work, yet many enterprises still treat it as an extension of network or endpoint security. Keep Aware's 2026 State of Browser Security Report shows 41% of employees used AI web tools while browser-based phishing, extensions, and social engineering drive new security blind spots.
Google says 90 zero-days were exploited in attacks last year
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.
Quando il rischio torna nel mondo fisico: il cloud e la sicurezza dimenticata
Il cloud viene raccontato come qualcosa di etereo, astratto: una “nuvola”. In realtà, è un’infrastruttura industriale distribuita, composta da edifici, sistemi energetici, apparati di rete, fibre ottiche e personale operativo. Dunque, la sicurezza è sempre di più anche una questione di infrastrutture, energia, geografia e resilienza
‘We’re not trying to remake the economy’: FTC’s Mufarrige charts new course on tech enforcement
Israel Claims it ‘Struck’ Iran’s Cyber Warfare Headquarters
Israel has claimed a successful strike on a Tehran-based compound that housed Iran’s "cyber warfare headquarters" and the "Intelligence Directorate," among
Police dismantle major phishing platform blamed for attacks on hospitals and schools
Police dismantle major phishing platform blamed for attacks on hospitals and schools
Police dismantles online gambling ring exploiting Ukrainian women
Spanish and Ukrainian law enforcement authorities dismantled a criminal ring that exploited war-displaced Ukrainian women to run an online gambling scheme that laundered nearly €4.75 million in illicit proceeds.
ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader
Cyble has identified a new Linux threat named ClipXDaemon that targets cryptocurrency users by intercepting and manipulating copied wallet addresses.
62 people indicted by Taiwanese prosecutors over ties to cyber scam company Prince Group
UAT-9244 targets South American telecommunication providers with three new malware implants
Cisco Talos is disclosing UAT-9244, who we assess with high confidence is a China-nexus advanced persistent threat (APT) actor closely associated with Famous Sparrow.
Threat Coverage Digest: New Malware Reports and 2,400+ Detection Rules
ANY.RUN expanded February threat coverage with 150 behavior signatures, 2 YARA and 2,314 Suricata rules to strengthen threat detection.
Iran, Russia e non solo: l’architettura della repressione digitale
I regimi autoritari fanno sempre più spesso affidamento agli spegnimenti di internet per reprimere il dissenso e bloccare le informazioni: ecco come funzionano i blackout della rete