Hooking the Archipelago: Dissecting a Phishing Campaign Targeting Philippine Banking Users
Publishers Clearing House: Ransomware Attack, Bankruptcy, and the Collapse of Trust
Google fixes fourth Chrome zero-day exploited in attacks in 2026
Google has fixed the fourth Chrome vulnerability exploited in zero-day attacks since the start of the year.
L’impero nascosto di Google mostra le debolezze dell’antitrust
La sterminata rete di aziende controllate dal colosso di Mountain View sfugge alle regole sulla concorrenza ma influenza l’economia digitale globale, sostiene un’analisi.
AI Startup Mercor Hit by Supply Chain Attack Linked to LiteLLM
The Mercor cyberattack tied to LiteLLM highlights supply chain risks, exposing vulnerabilities affecting thousands of companies globally.
SUCCESS - 253,510 breached accounts
In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach. The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders containing physical addresses and the payment method used. In SUCCESS' disclosure notice, they advised their system had also been abused to send offensive newsletters with quotes falsely attributed to contributors.
L’evoluzione globale del rischio cyber al tempo della guerra ibrida
Come incidono i conflitti geopolitici, le AI, la compliance normativa e il cybercrime sulla sicurezza delle organizzazioni. Così l'intensità della minaccia muta sempre più velocemente. La parola agli esperti
Google Drive ransomware detection now on by default for paying users
Google announced that the AI-powered Google Drive ransomware detection feature has reached general availability and is now enabled by default for all paying users.
North Korea’s Lazarus Group Behind the Axios npm Supply Chain Attack
On Monday, the Axios npm supply chain attack came to light where malicious packages had been inserted into one of JavaScript's most widely used libraries.
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
Kaspersky researchers analyze a new CrystalX RAT distributed as MaaS and featuring extensive spyware, stealer, and prankware capabilities.
Hacked, Leaked, Public—What the Kash Patel Email Hack Is Really About
The Kash Patel email hack triggered sharp and, at times, blunt responses from users.
New Windows 11 emergency update fixes preview update install issues
Microsoft released an emergency update to fix the March 2026 KB5079391 non-security preview update, which was pulled over the weekend due to installation issues.
Claude Code source code accidentally leaked in NPM package
Anthropic says it accidentally leaked the source code for Claude Code, which is closed source, but the company says no customer data or credentials were exposed.
Vibecoding: l’AI accelera lo sviluppo ma moltiplica i rischi
Il concetto di vibecoding – ovvero la generazione di codice direttamente da prompt in linguaggio naturale tramite modelli di intelligenza artificiale – sta rapidamente trasformando il modo in cui il software viene progettato e rilasciato. Un blogpost sul sito di Trend Micro analizza come questa nuova modalità di sviluppo ed elenca alcuni possibili scenari in …
Google now allows you to change your @gmail.com address
Google is rolling out a new feature that allows you to change your @gmail address or create a new alias.
Proton launches new "Meet" privacy-focused conferencing platform
Proton has announced a new video conferencing service named Meet and positioned it as a privacy-focused alternative to mainstream services like Google Meet, Zoom, and Microsoft Teams.
GIGABYTE Control Center vulnerable to arbitrary file write flaw
The GIGABYTE Control Center is vulnerable to an arbitrary file-write flaw that could allow a remote, unauthenticated attacker to access files on vulnerable hosts.
Claude AI finds Vim, Emacs RCE bugs that trigger on file open
Vulnerabilities in the Vim and GNU Emacs text editors, discovered using simple prompts with the Claude assistant, allow remote code execution simply by opening a file.
Google links axios supply chain attack to North Korean group
US indicts Maryland man for 2021 theft of $54 million from Uranium Finance
Cisco source code stolen in Trivy-linked dev environment breach
Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach its internal development environment and steal source code belonging to the company and its customers.
How to Fix “Not Secure” Warnings and SSL Issues in WordPress (8 Steps)
Learn why 'Not Secure' warnings happen in WordPress due to missing SSL certificates, what they mean for security, and how to fix Connection Not Secure browser errors for your website in eight simple steps.
Hacker hijacks Axios open-source project, used by millions, to push malware
A hacker inserted malware in Axios, an open-source web tool downloaded tens of millions of times weekly, in a widespread hack.
Reati informatici e punibilità: quando la “condotta” diventa reato prima del danno
Con la Legge 48/2008 sono state introdotte nel nostro ordinamento nuove ipotesi di reato che puniscono anche la semplice “condotta” volta a danneggiare un sistema, indipendentemente dal verificarsi del danno effettivo. Ecco le implicazioni
New criminal service plans to monetize data stolen by ransomware gangs
Pro-Russian hackers pose as Ukraine's cyber agency to target government, businesses
How to Categorize AI Agents and Prioritize Risk
AI agent risk isn't equal, it scales with access to systems and level of autonomy. Token Security explains how CISOs should categorize agents and prioritize what to secure first.
Sicurezza informatica, differenza tra progetto e processo: come cambia la cyber in azienda
La distinzione fra progetto e processo nella sicurezza inforatica incide direttamente sulla qualità delle decisioni, sulla gestione dei rischi e sulla sostenibilità delle soluzioni adottate. Ecco le definizioni operative, le implicazioni gestionali e gli errori più comuni, per non sbagliare approccio e per gettare le basi di una governance davvero efficace
Hackers compromise Axios npm package to drop cross-platform malware
Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windows, and macOS systems.
CISA tells federal agencies to patch Citrix NetScaler bug by Thursday