Hacker broke into FBI and compromised Epstein files, report says
According to a Reuters report, a foreign hacker broke into a server that was part of the FBI’s investigation into Jeffrey Epstein — without realizing they had hacked an FBI server.
Medtech giant Stryker offline after Iran-linked wiper malware attack
Leading medical technology company Stryker has been hit by a wiper malware attack claimed by Handala, an Iranian-linked and pro-Palestinian hacktivist group.
Dal porta a porta alla sanzione: Acea Energia paga 2 milioni di euro per violazioni GDPR
Il Garante privacy rende noto di avere inflitto una sanzione da 2milioni di euro ad Acea Energia per gravi violazioni privacy, emerse dal trattamento dei dati personali di oltre 1.200 clienti nell’ambito della fornitura di energia elettrica e gas. La vicenda denota quanto possa costare caro non avere, tra le altre, misure di sicurezza tecniche e organizzative adeguate
New PhantomRaven NPM attack wave steals dev data via 88 packages
New attack waves from the 'PhantomRaven' supply-chain campaign are hitting the npm registry, with dozens of malicious packages that exfiltrate sensitive data from JavaScript developers.
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said…
La puntata è uscita da qualche giorno e con i nuovi potentissimi tools sul sito del podcast trovate anche la sintesi auto-generata tramite LLM. L’argomento per molti potrebbe sembrare banale …
Navigating 2026’s Converged Threats: Insights from Flashpoint’s Global Threat Intelligence Report
We preview the critical findings of the 2026 Global Threat Intelligence Report, highlighting how the collapse of traditional security silos and the rise of autonomous, machine-speed attacks are forcing a total reimagining of modern defense.
Aggiornamenti Microsoft: corrette due zero-day e la prima vulnerabilità scoperta dall’IA
Microsoft rilascia gli aggiornamenti mensili con otto vulnerabilità critiche, una valanga di escalation di privilegi e una falla in Excel che potrebbe trasformare Microsoft Copilot in strumento di esfiltrazione dati. E, per la prima volta nella storia del Patch Tuesday, una CVE viene attribuita a un agente IA di penetration test
Phishing EasyPark: il brand sfruttato per sottrarre dati di pagamento e documenti di identità
Hai ricevuto una email EasyPark con richiesta di aggiornare il metodo di pagamento? Potrebbe essere phishing. Analizziamo la truffa e i rischi per gli utenti.
Tutte le minacce del 2025 e le priorità di difesa nel nuovo anno
La valutazione critica dei fatti di sicurezza avvenuti e delle tendenze future deve essere rapportata alle capacità di difesa della propria organizzazione. E questo per far emergere un eventuale divario di sicurezza e per poi pianificare interventi adeguati. Ecco come investire in resilienza
Spinning complex ideas into clear docs with Kri Dontje
The episode features Kri Dontje discussing her role in translating complex technical cybersecurity topics into clear, accessible documentation, emphasizing the importance of consistency, accuracy, and collaboration with subject matter experts.
Agentic AI security: Why you need to know about autonomous agents now
There are many benefits and security risks of deploying agentic AI within organizations. This blog emphasizes the importance of robust risk management and threat modeling to defend against both internal operational errors and potential malicious exploitation.
L’Iran ha cominciato la contro-guerra cyber: dai Ddos ai sabotaggi, ecco cosa bisogna sapere
L’Iran sta usando il dominio cyber come strumento elastico di rappresaglia, con una prima fascia visibile a bassa soglia e una seconda fascia meno rumorosa ma pericolosa che riguarda accessi, persistenza, raccolta informativa ai danni di infrastrutture critiche occidentali. Vediamo che succede, cosa succederà, cosa trarne
Iran’s Fake “Shelter Danger” Calls Part of Psychological Cyber Warfare Playbook
When your phone rings and the caller ID shows the Israeli military’s emergency command number, most people would listen — and that is precisely the point. Israel’s National Cyber Directorate issued an urgent public advisory Tuesday, warning citizens about a wave of fraudulent automated phone calls impersonating the Israel Defense Forces’ Home Front Command, the […]
Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usual some patches may…
Handala and the release of strategic information regarding Israeli organizations
In recent days, the Handala group has publicly released information regarding more than 180 profiles associated to the Israeli Air Force and other strategic organizations/sectors. Who is Handala? Handala (also known as Handala Hack Team, Hatef, and Hamsa) is a pro-Iran hacktivist persona that has been active since at least December 2023. The group is
New ‘BlackSanta’ EDR killer spotted targeting HR departments
For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta.
Microsoft Patch Tuesday for March 2026 — Snort rules and prominent vulnerabilities
Microsoft has released its monthly security update for March 2026 which includes 79 vulnerabilities, including three that Microsoft marked as “critical.”
New BeatBanker Android malware poses as Starlink app to hijack devices
A new Android malware named BeatBanker can hijack devices and tricks users into installing it by posing as a Starlink app on websites masquerading as the official Google Play Store.
DOGE employee stole Social Security data and put it on a thumb drive, report says
A whistleblower is accusing a former DOGE member of stealing a large number of Americans’ personal data while he was working at the Social Security Administration, with the plan of using it at his new job.
New 'Zombie ZIP' technique lets malware slip past security tools
A new technique dubbed "Zombie ZIP" helps conceal payloads in compressed files specially created to avoid detection from security solutions such as antivirus and endpoint detection and response (EDR) products.