Termite ransomware breaches linked to ClickFix CastleRAT attacks
Termite ransomware breaches linked to ClickFix CastleRAT attacks
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.
·bleepingcomputer.com·
Termite ransomware breaches linked to ClickFix CastleRAT attacks
Ecco la strategia cyber “For America”: un segnale per l’Europa
Ecco la strategia cyber “For America”: un segnale per l’Europa
La nuova "cyber strategy for America" uscita a marzo lega sicurezza digitale e competizione tecnologica, puntando su deterrenza, infrastrutture critiche e intelligenza artificiale. Il documento valorizza il ruolo del settore privato e delle filiere, mentre l’Europa resta più normativa e orientata agli standard condivisi
·cybersecurity360.it·
Ecco la strategia cyber “For America”: un segnale per l’Europa
Microsoft: Hackers abusing AI at every stage of cyberattacks
Microsoft: Hackers abusing AI at every stage of cyberattacks
Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack.
·bleepingcomputer.com·
Microsoft: Hackers abusing AI at every stage of cyberattacks
Cognizant TriZetto breach exposes health data of 3.4 million patients
Cognizant TriZetto breach exposes health data of 3.4 million patients
TriZetto Provider Solutions, a healthcare IT company that develops software and services used by health insurers and healthcare providers, has suffered a data breach that exposed the sensitive information of over 3.4 million people.
·bleepingcomputer.com·
Cognizant TriZetto breach exposes health data of 3.4 million patients
InstallFix: false guide di installazione CLI per installare infostealer
InstallFix: false guide di installazione CLI per installare infostealer
Nel mondo dello sviluppo software e delle infrastrutture IT, copiare e incollare comandi di installazione da documentazioni online è diventata una pratica quotidiana. Ma proprio questa abitudine, ormai radicata tra sviluppatori, amministratori di sistema e professionisti DevOps, sta diventando il punto di ingresso per una nuova tecnica di social engineering. I ricercatori della società di …
·securityinfo.it·
InstallFix: false guide di installazione CLI per installare infostealer
The CTF Ecosystem Is Stagnant and Has Been for Twenty Years
The CTF Ecosystem Is Stagnant and Has Been for Twenty Years
CTFs haven't changed in decades. Better puzzles, same game. The problem isn't technical difficulty, it's that nobody has ever made you commit to anything.
·secjuice.com·
The CTF Ecosystem Is Stagnant and Has Been for Twenty Years
People, Policies, and Purpose: Framing Acceptable Use and Human Behavior in Information Security
People, Policies, and Purpose: Framing Acceptable Use and Human Behavior in Information Security
Part 2 of a series on creating information security policies Many breaches don’t start with sophisticated hackers; they start with ordinary users doing ordinary things in unsafe ways. Let’s look at 3 ways to work toward helping people in our organizations understand better how to safeguard everyone’s information. Because there are as many ways to create a policy as there are organizations - compounded with the numerous requirements from regulations - I won’t attempt to provide a one-size-fits-
·secjuice.com·
People, Policies, and Purpose: Framing Acceptable Use and Human Behavior in Information Security
TikTok non adotta la crittografia dei messaggi diretti: preoccupati gli esperti di privacy
TikTok non adotta la crittografia dei messaggi diretti: preoccupati gli esperti di privacy
L'assenza di crittografia consente alla piattaforma di monitorare i direct message (DM) alla ricerca di contenuti dannosi e di condividerli con le autorità competenti su richiesta. Ma per gli utenti la rinuncia di TikTok alla crittografia end-to-end significa meno privacy. Ecco come bilanciare diritto alla riservatezza delle comunicazioni e sicurezza pubblica
·cybersecurity360.it·
TikTok non adotta la crittografia dei messaggi diretti: preoccupati gli esperti di privacy
Fake Claude Code install guides push infostealers in InstallFix attacks
Fake Claude Code install guides push infostealers in InstallFix attacks
Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users into running malicious commands under the pretext of installing legitimate command line interface (CLI) tools.
·bleepingcomputer.com·
Fake Claude Code install guides push infostealers in InstallFix attacks
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI Credential Suite, with four new role-based AI certifications debuting alongside Certified CISO v4, an overhauled executive cyber leadership program.
·bleepingcomputer.com·
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
Un rischio è per sempre?
Un rischio è per sempre?
Riesaminare i rischi nel tempo è un'attività fondamentale, soprattutto negli ecosistemi complessi della sicurezza cyber in cui il cambio dei contesti e dei paradigmi tecnologici influenza in modo significativo non solo la variazione dei rischi ma anche l'emergere di nuove minacce
·cybersecurity360.it·
Un rischio è per sempre?
Microsoft 365 Backup to add file-level restore for faster recovery
Microsoft 365 Backup to add file-level restore for faster recovery
Microsoft will soon begin rolling out a significant upgrade to Microsoft 365 Backup to speed up recovery by allowing administrators to restore individual files and folders.
·bleepingcomputer.com·
Microsoft 365 Backup to add file-level restore for faster recovery
Prompt ignition: la nuova superficie d’attacco dei modelli linguistici
Prompt ignition: la nuova superficie d’attacco dei modelli linguistici
Quando l’LLM elabora quel contenuto, può interpretare parti del testo come istruzioni operative, modificando il proprio comportamento. La particolarità è che l’attacco non sfrutta vulnerabilità eseguibili, ma ambiguità linguistiche perché la vulnerabilità non è nel codice, ma nel modo in cui il modello costruisce e interpreta il contesto
·cybersecurity360.it·
Prompt ignition: la nuova superficie d’attacco dei modelli linguistici
Shadow IT: The Initial Access You Didn’t Log
Shadow IT: The Initial Access You Didn’t Log
Shadow IT isn’t just governance debt, it’s an attacker’s beachhead. This post explores real intrusions where forgotten assets, rogue tenants, exposed cloud storage, and abandoned domains enabled initial access, and why closing visibility gaps is now a core SOC capability.
·blog.sekoia.io·
Shadow IT: The Initial Access You Didn’t Log
Ghanain man pleads guilty to role in $100 million fraud ring
Ghanain man pleads guilty to role in $100 million fraud ring
A Ghanaian national pleaded guilty to his role in a massive fraud ring that stole over $100 million from victims across the United States through business email compromise attacks and romance scams.
·bleepingcomputer.com·
Ghanain man pleads guilty to role in $100 million fraud ring
Exploits and vulnerabilities in Q4 2025
Exploits and vulnerabilities in Q4 2025
This report provides statistical data on published vulnerabilities and exploits we researched during Q4 2025. It also includes summary data on the use of C2 frameworks in APT attacks.
·securelist.com·
Exploits and vulnerabilities in Q4 2025
Privileged Access Management (PAM) nell’era cloud-first: le 10 migliori pratiche operative
Privileged Access Management (PAM) nell’era cloud-first: le 10 migliori pratiche operative
L'adozione di un approccio di Privileged Access Management (PAM) moderno e adattivo non è più un'opzione, ma un imperativo strategico per garantire la sicurezza, la governance e l'innovazione digitale. Ecco i rischi e le 10 migliori soluzioni implementative
·cybersecurity360.it·
Privileged Access Management (PAM) nell’era cloud-first: le 10 migliori pratiche operative
I dubbi sulla sicurezza degli impianti di videosorveglianza
I dubbi sulla sicurezza degli impianti di videosorveglianza
Un'indagine svolta dall'Istituto Piepoli per conto di U.Di.Con dà risultati dicotomici: chi ha impianti di videosorveglianza in casa si sente più sicuro ma, nel 71% dei casi, teme che la propria privacy possa essere compromessa
·cybersecurity360.it·
I dubbi sulla sicurezza degli impianti di videosorveglianza
16-28 February 2026 Cyber Attacks Timeline
16-28 February 2026 Cyber Attacks Timeline
In the second half of February 2026 I collected 80 events with a threat landscape dominated by malware with 42%, ahead of account takeovers and ransomware.
·hackmageddon.com·
16-28 February 2026 Cyber Attacks Timeline
FBI investigates breach of surveillance and wiretap systems
FBI investigates breach of surveillance and wiretap systems
The U.S. Federal Bureau of Investigation (FBI) confirmed on Thursday that it's investigating a breach that affected systems used to manage surveillance and wiretap warrants.
·bleepingcomputer.com·
FBI investigates breach of surveillance and wiretap systems
Chinese state hackers target telcos with new malware toolkit
Chinese state hackers target telcos with new malware toolkit
A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices.
·bleepingcomputer.com·
Chinese state hackers target telcos with new malware toolkit
Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
Fake OpenClaw installers hosted in GitHub repositories and promoted by Microsoft Bing's AI-enhanced search feature instructed users to run commands that deployed information stealers and proxy malware.
·bleepingcomputer.com·
Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware