White House pours cold water on cyber ‘letters of marque’ speculation
Russian hackers exploit Zimbra flaw in Ukrainian govt attacks
Hackers part of APT28, a state-backed threat group linked to Russia's military intelligence service (GRU), are exploiting a Zimbra Collaboration Suite (ZCS) vulnerability in attacks targeting Ukrainian government entities.
Risolto bug Bluetooth di Windows 11: cosa insegna sulla sicurezza del wireless aziendale
Microsoft ha rilasciato un aggiornamento urgente e “silenzioso” per correggere una vulnerabilità critica nell'interfaccia di gestione Bluetooth di Windows 11. Ma al di là del fix puntuale, il caso apre una riflessione più ampia: la superficie d’attacco Bluetooth nelle reti aziendali è ancora sistematicamente sottovalutata
Ransomware attack on UMMC: Medusa claims 1 TB of exfiltrated data as new details emerge
The University of Mississippi Medical Center (UMMC) is the primary academic healthcare system in the state of Mississippi. Based in Jackson, it serves as a
7 Ways to Prevent Privilege Escalation via Password Resets
Password resets are often weaker than login security, making them a prime target for privilege escalation. Specops Software explains how attackers abuse reset workflows and how to secure them.
Interlock ransomware gang exploited Cisco firewall zero-day weeks before disclosure: Amazon
Faraday bag, a cosa servono per la privacy e la sicurezza su smartphone (e a cosa no)
Le Faraday bag, sacchetti, borselli, zaini, servono a schermare le emissioni elettromagnetiche, impedendo quindi agli oggetti che ci sono dentro di comunicare con l’esterno. Sono usate a scopi professionali, ma anche da persone molto attente alla propria privacy e alla sicurezza dei loro dispositivi. Ecco utilità e limiti
Ready for macOS Threats: Expanding Your SOC’s Cross-Platform Analysis with ANY.RUN
macOS threats are targeting enterprise environments. See how SOC teams can investigate cross-platform malware faster with interactive sandbox.
Max severity Ubiquiti UniFi flaw may allow account takeover
Ubiquiti has patched two vulnerabilities in the UniFi Network Application, including a maximum-severity flaw that may allow attackers to take over user accounts.
Russian hackers exploit Zimbra flaw to breach Ukrainian maritime agency
Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
WordPress plugin "Profile Builder Pro" (versions before 3.14.5) is susceptible to Unauthenticated PHP Object Injection. In this blog post, we discuss how we discovered and exploited the vulnerability using a novel POP chain, how AI helped in the process, taking a final look at targets in the wild.
Apple Patches WebKit Vulnerability CVE-2026-20643 Across iOS, macOS
Apple patches WebKit Vulnerability CVE-2026-20643 via background updates across iOS, iPadOS, and macOS.
Interlock Ransomware Leveraged Cisco FMC Zero-Day 36 Days Before Patch, Amazon Reveals
Amazon MadPot uncovers Interlock ransomware exploiting FMC CVE-2026-20131 pre-disclosure, using zero-day access and advanced attack tools.
CISA urges US orgs to secure Microsoft Intune systems after Stryker breach
CISA warned U.S. organizations to follow Microsoft guidance to strengthen the Intune endpoint management tool after a cyberattack exploited it to wipe medical technology giant Stryker's systems.
Oltre la trasmissione sicura: acceleratori crittografici per proteggere i dati in uso
Nei sistemi cyber-fisici e IoT la protezione del dato non può più fermarsi al canale o al repository: la vera frontiera è difenderlo anche mentre viene elaborato, su edge e cloud che non possono essere considerati affidabili per definizione, grazie agli acceleratori crittografici
Inside Russia’s Shift to Credential-Based Intrusions: What CISOs Need to Know in 2026
Inside Russia credential-based intrusions, identity-based cyber attacks, and account takeover attacks reshaping OT risk for CISOs in 2026.
Critical Microsoft SharePoint flaw now exploited in attacks
A critical Microsoft SharePoint vulnerability patched in January is now being exploited in attacks, the Cybersecurity and Infrastructure Security Agency (CISA) warned.
New ‘Perseus’ Android malware checks user notes for secrets
A new Android malware called Perseus is checking user-curated notes to steal sensitive information, like passwords, recovery phrases, or financial data.
China Sits at the Top of America’s Cyber Threat List
The IC's assessment reserves its sharpest language for China. Beijing is the most active and persistent cyber threat to U.S. government, private-sector, and
Everyday tools, extraordinary crimes: the ransomware exfiltration playbook
Attackers use trusted tools for data theft, making traditional detection unreliable. The Exfiltration Framework enables defenders to spot exfiltration by focusing on behavioral signals across endpoints, networks, and cloud environments rather than static tool indicators.
Perseus: DTO malware that takes notes
LLM in guerra: il Pentagono aprirà alle aziende la possibilità di training AI con dati riservati
I modelli di IA generativa utilizzati in ambienti riservati sono in grado di rispondere alle domande, ma al momento non imparano dai dati che analizzano. La situazione potrebbe cambiare presto. Ecco perché il Pentagono sta pianificando di consentire alle aziende specializzate in AI di addestrare i propri modelli utilizzando dati riservati
Multiple Threat Actors Exploiting a Six-Vulnerability iOS Exploit Kit Dubbed “DarkSword”
Researchers disclose a new iOS full-chain exploit kit dubbed DarkSword — a name taken directly from a variable buried inside the malware's own code.
Hasta la vista, Hastalamuerte: An Overview of The Gentlemen’s TTPs
CISA Urges Endpoint Management Hardening After Stryker Cyberattack
CISA confirmed it is actively monitoring malicious cyber activity targeting endpoint management systems across U.S. organizations.
DarkSword: exploit chain iOS tra zero-day, spyware e cybercrime finanziario
Google Threat Intelligence Group, un’unità specializzata di Google Cloud dedicata alla cybersicurezza, ha appena rilasciato un blogpost quantomeno preoccupante. Il toolkit noto come DarkSword propone una catena di exploit completa capace di compromettere interamente dispositivi iOS sfruttando vulnerabilità multiple, inclusi zero-day, e viene sfruttata sia in operazioni di cyberspionaggio sia in attività criminali orientate al …
Aura confirms data breach exposing 900,000 marketing contacts
Identity protection company Aura has confirmed that an authorized party gained access to nearly 900,000 customer records containing names and email addresses.
Russia-linked hackers use advanced iPhone exploit to target Ukrainians
CISA orders feds to patch Zimbra XSS flaw exploited in attacks
CISA has ordered U.S. government agencies to secure their servers against an actively exploited vulnerability in the Zimbra Collaboration Suite (ZCS).
DHS nominee Mullin pressed on restoring CISA staffing