Man pleads guilty to $8 million AI-generated music scheme
Iran-Linked Handala Hackers Launch New Domain Hours After FBI Seized the Older One
Handala hackers are back online just hours after the FBI announced its clearnet domains seizure.
North Korea’s Crypto Theft Operations: The Role of Lazarus Group in State-Sponsored Financial Warfare
Lazarus Group cyberattack on Bitrefill shows how North Korean hackers exploit crypto platforms, credentials, and human error for large-scale theft.
The Cyber Express Weekly Roundup: Cyberattacks, AI Risks, and Geopolitical Cyber Threats
The Cyber Express weekly cybersecurity roundup covering Stryker attack, AI legal risks, nation-state threats, and rising cyber warfare across global regions.
ANY.RUN Enters IT-Harvest’s 2026 Cyber 150 for Fast Growth and Industry Impact
ANY.RUN has been recognized by IT-Harvest in the 2026 Cyber 150 for the second year in a row, highlighting the company’s growth and industry momentum.
Musician admits to $10M streaming royalty fraud using AI bots
North Carolina musician Michael Smith has pleaded guilty to collecting over $10 million in royalty payments through a massive streaming royalty fraud scheme on Spotify, Apple Music, Amazon Music, and YouTube Music.
Diritto di accesso e abuso: altro che stretta, da oggi è più difficile dire di no
La Corte di giustizia UE interviene sul diritto di accesso: anche una prima richiesta può essere “eccessiva”, ma la CGUE alza la soglia per rifiutare introducendo un onere probatorio stringente a carico del titolare: l’abuso va dimostrato con criteri rigorosi, non è una legittimazione preventiva al rigetto delle richieste
The Week in Vulnerabilities: Juniper, Cisco SD-WAN, and Critical ICS Exposure
Cyble tracked 1,641 vulnerabilities and 24 ICS flaws in a week, with 175 PoCs and multiple KEV additions, increasing risks across enterprises.
Voucher Cloud & Cybersecurity: il perimetro dell’iniziativa per Pmi esposte a cyber attacchi
Il 23 aprile 2026 scade il termine entro cui i fornitori di tecnologia potranno completare il processo di iscrizione e accreditamento nell'elenco del Mimit. Ecco cosa prevede il Voucher Cloud & Cybersecurity, qual è l'impatto sulle Pmi, l'evoluzione della cyber DNS-first e il ruolo del Made in Italy nella sicurezza digitale
International joint action disrupts world’s largest DDoS botnets
Authorities from the United States, Germany, and Canada have taken down Command and Control (C2) infrastructure used by the Aisuru, KimWolf, JackSkid, and Mossad botnets to infect Internet of Things (IoT) devices.
Android Malware Campaign Targets Indian Users via Fake eChallan Alerts
CERT-In warns of an Android malware campaign using eChallan and RTO Challan scams to steal financial data via APKs and phishing sites.
Microsoft: March Windows updates break Teams, OneDrive sign-ins
Microsoft says the March Windows 11 update breaks sign-ins with Microsoft accounts across multiple Microsoft apps, including Teams and OneDrive.
U.S. Shuts Down Websites Behind Iran-Linked Cyber Attacks and Death Threats
The focus is on disruption. But the methods behind these Iran-linked cyberattacks suggest this kind of activity is unlikely to disappear anytime soon.
Ex-data analyst stole company data in $2.5M extortion scheme
A North Carolina man was found guilty of extorting a D.C.-based technology company while still being employed as a data analyst contractor.
Pixel Watch Users Report Inflated Steps, Missing SpO2 Data
March Pixel firmware update causes Fitbit tracking errors, inflated steps, and missing SpO2 data, raising concerns about Pixel Watch accuracy.
Perseus Android Malware Targets Mobile Banking Users via Fake IPTV Apps
Perseus Android malware may be built on older code, but its execution feels current—and that’s exactly why it matters.
Cyble Partners with Optiv to Bring Digital Risk Protection into MSSP Operations
By bringing digital risk protection from Cyble into Optiv’s managed security operations, this approach helps close that visibility gap.
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds…
Navia discloses data breach impacting 2.7 million people
Navia Benefit Solutions, Inc. (Navia) is informing nearly 2.7 million individuals of a data breach that exposed their sensitive information to attackers.
New ‘PolyShell’ flaw allows unauthenticated RCE on Magento e-stores
A newly disclosed vulnerability dubbed 'PolyShell' affects all Magento Open Source and Adobe Commerce stable version 2 installations, allowing unauthenticated code execution and account takeover.
You have to invite them in
While a garlic and wooden stakes keep the vampires at bay in movies, they won’t save your network once an attacker has been "invited in." Discover why identity is the new frontier of cyber horror in this week’s edition.
Iran-Aligned Militias Signal Expanded Regional Risk Amid US–Israel–Iran Conflict
Iran-aligned militant groups are signaling coordinated activity across the Middle East. Flashpoint analyzes how this messaging points to increased regional risk for US and Israeli interests.
DarkSword, l’exploit kit che ha violato gli iPhone di mezzo mondo per rubare dati riservati
È dal novembre 2025 che DarkSword sta compromettendo iPhone in modo sistematico e silenzioso. Sei vulnerabilità concatenate, tre zero-day, tre famiglie di malware distinte e almeno tre attori che lo usano in contemporanea. È la minaccia iOS più sofisticata degli ultimi anni. Ecco tutto quello che c'è da sapere e come difendersi
US intel chiefs urge lawmakers to extend Section 702 surveillance power without changes
Bitrefill blames North Korean Lazarus group for cyberattack
Crypto-powered gift card store Bitrefill says that the attack it suffered at the beginning of the month was likely perpetrated by North Korean hackers of the Bluenoroff group.
New Android malware hiding in streaming apps to spy on users’ personal notes
FBI seizes Handala data leak site after Stryker cyberattack
The FBI has seized two websites used by the Handala hacktivist group after the threat actors conducted a destructive cyberattack on medical technology giant Stryker that wiped approximately 80,000 devices.
FBI seizes pro-Iranian hacking group’s websites after destructive Stryker hack
The FBI and the Justice Department took down two websites linked to the pro-Iranian hacktivist group Handala, which last week hacked medical tech giant Stryker.
FBI, CISA warn on Microsoft Intune risks after Iran-linked cyberattack on Stryker
La cybersecurity OT in Italia tra maturità limitata e pressioni normative
Secondo un’analisi condotta da HWG Sababa e presentata all’interno del Rapporto Clusit 2026, emerge un quadro estremamente dettagliato e critico sullo stato della sicurezza nei sistemi industriali italiani. I dati, raccolti tra ottobre 2024 e ottobre 2025 attraverso attività di gap analysis e risk assessment lungo l’intera supply chain OT, delineano un ecosistema ancora fragile, …