Australia, New Zealand, Tonga, Warn of Rising INC Ransom Attacks Targeting Pacific Networks
ACSC, NCSC, and CERT Tonga warn of rising INC Ransom attacks targeting Australia, New Zealand, and Pacific networks via affiliate ransomware campaigns.
Fake enterprise VPN downloads used to steal company credentials
A threat actor tracked as Storm-2561 is distributing fake enterprise VPN clients from Ivanti, Cisco, and Fortinet to steal VPN credentials from unsuspecting users.
Police sinkholes 45,000 IP addresses in cybercrime crackdown
An international law enforcement action codenamed "Operation Synergia III" has sinkholed tens of thousands of IP addresses and seized servers linked to cybercrime operations worldwide.
Banca Intesa Sanpaolo, maxi sanzione privacy: perché il problema è la base giuridica
L’Autorità garante per la protezione dei dati ha comminato una sanzione di oltre 17 milioni di euro all'istitutodi credito Intesa Sanpaolo per aver profilato illegittimamente quasi 2,5 milioni di correntisti, in una cessione, a favore di una controllata al 100%. Ecco le gravi le violazioni privacy riscontrate
Alleged Cyberattack on KLA Laboratories Involves Client and Employee Data, According to Anubis
KLA Laboratories, a U.S.-based company specializing in the integration of technology infrastructures, may have been involved in a reported cyberattack claimed
Veeam Fixes RCE Bugs in Critical Backup & Replication Platform
An important Veeam security patch to address multiple vulnerabilities in its Backup & Replication platform that potentially allowed attackers to execute malicious code remotely, has been released.
Exclusive: Alleged Cyberattack on KLA Laboratories Involves Client and Employee Data, According to Anubis
KLA Laboratories, a U.S.-based company specializing in the integration of technology infrastructures, may have been involved in a reported cyberattack claimed
AI e linguistica: il rischio di bias profondi occulti e il ruolo della privacy
Esistono bias linguistici profondi occulti nei large language models (LLM). Ecco le implicazioni concettuali, progettuali e normative, con particolare attenzione alla privacy intesa come tutela delle traiettorie identitarie future
Oltre l’RSA: la migrazione verso la crittografia post-quantum secondo gli standard NIST
I settori con un'alta ritenzione del dato (sanità, finanza, difesa, telco) affrontano un orizzonte di esposizione catastrofico se la migrazione non viene avviata immediatamente, vanificando la confidenzialità a lungo termine. Ecco come garantire la Crypto-Agility che permetterà all'azienda di sopravvivere incolume alle tempeste crittografiche del futuro
The Ultimate Guide to Dark Web Monitoring in 2026: Protect Your Data Before Attackers Strike
Dark web intelligence helps organizations detect stolen credentials, leaked data, and cyber threats early, enabling faster response and stronger security.
Canadian retail giant Loblaw notifies customers of data breach
Still, out of an abundance of caution, Loblaw says it has automatically logged out all customers from their accounts. Account holders who need to access the company's digital services will have to log in again.
England Hockey investigating ransomware data breach
England Hockey, the governing body for field hockey in England, is investigating a potential data breach after the AiLock ransomware gang listed it as a victim on its data leak site.
AI-generated Slopoly malware used in Interlock ransomware attack
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware attack.
Flashpoint analysis of the cyberattack on Stryker explores potential links to the Handala threat persona and what the incident signals about evolving threats to healthcare supply chains.
Law enforcement shuts down botnet made of tens of thousands of hacked routers
An international law enforcement operation shut down a service called SocksEscort, which allegedly helped cybercriminals all over the world launch ransomware and DDoS attacks, as well as distribute child sexual abuse material.
Veeam warns of critical flaws exposing backup servers to RCE attacks
Data protection company Veeam Software has patched multiple flaws in its Backup & Replication solution, including four critical remote code execution (RCE) vulnerabilities.