Drift crypto platform confirms $280 million stolen in hack as researchers point finger at North Korea
French Senate passes bill that would ban children under 15 from social media
Proxy residenziali: quando la reputazione degli IP smette di funzionare
Secondo un’analisi pubblicata da GreyNoise, basata su oltre 4 miliardi di sessioni malevole osservate in tre mesi, i proxy residenziali stanno ridefinendo radicalmente il modo in cui gli attaccanti eludono i sistemi di difesa tradizionali. Il dato più rilevante è che circa il 39% del traffico malevolo proviene da reti domestiche, ma il 78% di …
Claude, 500mila righe di codice esposte per errore: i rischi per la supply chain software
La pubblicazione accidentale da parte di Anthropic del codice sorgente di Claude Code a causa di un errore di packaging, in cui nessun dato è stato compromesso, fa emergere rischi concreti nella supply chain software e la fragilità dei processi di sviluppo moderni
ICE says it bought Paragon’s spyware to use in drug trafficking cases
The acting director of U.S. Immigration and Customs Enforcement told lawmakers that the use of Paragon spyware is necessary to counter terrorists’ “thriving exploitation of encrypted communications platforms.”
Residential proxies evaded IP reputation checks in 78% of 4B sessions
Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.
Internet in Russia al rallentatore: fra restrizioni e aggiramenti, ecco il futuro della rete dello zar
Parallelamente al filtraggio puntuale, le autorità hanno perfezionato la tecnica del throttling, per rendere praticamente inutilizzabili le piattaforme prese di mira. Ecco cosa succede a Internet in Russia, dove l'infrastruttura di censura spicca tra le più sofisticate al mondo e si va verso un ecosistema digitale alternativo alla cinese: chiuso e controllato
Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime
Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector.
New Progress ShareFile flaws can be chained in pre-auth RCE attacks
Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from affected environments.
Medtech giant Stryker fully operational after data-wiping attack
Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the Iranian-linked Handala hacktivist group.
PanoptiCON2026 - Fuoco invisibile: la difesa inizia da ciò che sai vedere
Managed Detection & Response services (MDR) 24/7 for network, endpoint, cloud, SaaS and OT, against every type of cyber attack
[Video] The TTP Ep 21: When Attackers Become Trusted Users
An episode of the Talos Threat Perspective on the 2025 Year in Review trends. We explore how identity is being used to gain, extend, and maintain access inside environments.
App-server Codex di OpenAI: configurazione insicura espone a esecuzione di comandi remoti
Il CERT-AgID ha segnalato un problema di sicurezza dell’app-server Codex di OpenAI: non prevedendo meccanismi di protezione e autenticazione, una sua esposizione in rete potrebbe consentire a soggetti non autorizzati di interagire direttamente con il sistema ed eseguire comandi remoti. Ecco come mitigare il rischio
Mongoose: Preauth RCE and mTLS Bypass on Millions of Devices
The Malware Gap: Why Fraud & Security Controls Still Miss Mobile Malware
Critical Cisco IMC auth bypass gives attackers Admin access
Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables attackers to gain Admin access.
From Reactive to Proactive: 5 Steps to SOC Maturity with Threat Intelligence
Transform your SOC with actionable threat intelligence that connects indicators to behavior, improves decisions, and accelerates detection and response.
An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases
There were 134 ransomware incidents reported in Japan in 2025, representing a 17.5% year-over-year increase from 2024.
Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders
A conversation between Cisco Talos and Cisco Security leaders on the 2025 threat landscape, from identity attacks and legacy vulnerabilities to AI-driven threats, and what defenders should prioritize now.
Qilin EDR killer infection chain
This blog provides an in-depth analysis of the malicious “msimg32.dll” used in Qilin ransomware attacks, which is a multi-stage infection chain targeting EDR systems.
UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications
Talos is disclosing a large-scale automated credential harvesting campaign carried out by a threat cluster we currently track as UAT-10608. The campaign is primarily leveraging a collection framework dubbed “NEXUS Listener.”
Phishing e attacchi AiTM: come le email compromesse diventano trampolini per spam massivo
Il phishing non punta più a leggere le email ma a usare account compromessi come trampolini. Tecniche AiTM intercettano token e cookie di sessione aggirando l'MFA, mentre i kit di phishing-as-a-service abbassano la barriera tecnica. Necessario monitoraggio comportamentale e analisi forense post-compromissione
The Week in Vulnerabilities: AI Frameworks, VMware, and Critical ICS Exposure
Cyble tracked 1,452 vulnerabilities and 150 ICS flaws this week, with 222 PoCs and multiple KEV additions, exposing enterprise platforms.
Microsoft links Classic Outlook issue to email delivery problems
Microsoft is investigating a known issue that prevents some Classic Outlook users from sending emails via Outlook.com.
Vietnam-Linked PXA Stealer Campaign Exploits LinkedIn to Target Professionals Globally
Vietnam-linked actors use PXA Stealer via LinkedIn and Apex Logistics Group to steal credentials, crypto wallets, and sensitive data globally.
FBI Warns of AVrecon Malware Targeting Network Devices Across 163 Countries
AVrecon spreads by scanning the internet for devices with exposed vulnerable services.
FBI Warns of Data Security Risks in Foreign-Developed Mobile Apps
The data security risks of foreign-developed mobile apps are not limited to what users see on the surface.
Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks
Internet security watchdog Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote code execution (RCE) vulnerability.
Claude e Firefox, l’AI accelera la ricerca di vulnerabilità e diventa parte del DevSecOps
Nel corso della collaborazione con Mozilla Foundation, Claude Opus 4.6 ha contribuito a individuare 112 bug, tra cui 22 vulnerabilità di sicurezza confermate, di cui 14 classificate ad alta gravità. Ecco il ruolo dell'AI nel DevSecOps
Hasbro Discloses Cyberattack After Unauthorized Network Access Detected
Hasbro cyberattack reported on March 28, 2026, prompting investigation and containment measures to secure business operations.