New Keenadu backdoor found in Android firmware, Google Play apps
A newly discovered and sophisticated Android malware called Keenadu has been found embedded in firmware from multiple device brands, enabling it to compromise all installed applications and gain unrestricted control over infected devices.
In recent investigations, Binary Defense researchers observed multiple phishing campaigns abusing SVG files. Much like other modern phishing techniques, these campaigns rely less on obvious malware and more on abusing legitimate functionality in unexpected ways.
Smetti di contare i virus bloccati: le uniche 3 metriche che interessano al CdA
Per tradurre il rischio cyber in impatto finanziario il CISO deve necessariamente imparare la lingua del business e fornire le giuste formule economiche e ottenere finalmente il budget necessario dal Board. Ecco alcuni consigli operativi
Трояны Android.Phantom заражают смартфоны через игры и пиратские моды, используя ИИ и видеотрансляции для накрутки кликов
Эксперты «Доктор Веб» выявили семейство Android.Phantom — трояны распространяются через мобильные игры и модифицированные версии популярных приложений, используют машинное обучение и WebRTC для удаленного управления браузером, накрутки кликов и скрытого сбора данных пользователей
Il Cloud Security Report 2026 di Fortinet rivela un divario di complessità
I dati contenuti in questo rapporto tracciano un quadro chiaro: affinché le imprese possano disporre della cloud security più efficace, devono concentrarsi sulla risoluzione delle principali problematiche attuali. Ecco quali
Stavo cercando un documento in PDF per mio figlio, una delle tante ricerche, ed uno dei risultati di ricerca era questo sito (ancora online al momento della pubblicazione del post): Screenshot del …
Poland arrests suspect linked to Phobos ransomware operation
Polish police have detained a 47-year-old man suspected of ties to the Phobos ransomware group and seized computers and mobile phones containing stolen credentials, credit card numbers, and server access data.
Ireland now also investigating X over Grok-made sexual images
Ireland's Data Protection Commission (DPC), the country's data protection authority, has opened a formal investigation into X over the use of the platform's Grok artificial intelligence tool to generate non-consensual sexual images of real people, including children.
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
Kaspersky experts have uncovered Keenadu, a sophisticated new backdoor targeting tablet firmware as well as system-level and Google Play apps. They also revealed connections between the world’s most prolific Android botnets.
Convenzione di Budapest, metodo e fiducia per una prova che regge tra gli Stati
La Convenzione di Budapest è una vera e propria architettura della prova digitale, perché nasce per rendere possibile l’accertamento. Ecco le prove forensi nel contesto NIS 2
Sempre più impeccabili nei contenuti e sempre più mirate. Un’ondata di telefonate a cui seguono messaggi WhatsApp aiuta a comprendere il nuovo corso delle truffe telefoniche e quali strumenti usare per scongiurare il peggio
In February 2026, a data breach allegedly containing data relating to Canada Goose customers was published publicly. The data contained 920k records with 582k unique email addresses and included names, phone numbers, IP addresses, physical addresses and partial credit card data, specifically card type and last 4 digits. Canada Goose advised that the data "appears to relate to past customer transactions" and stated that it originated from a breach at a third party in August 2025. The most recent transaction date in the data is July 2025.
Il recruiting si trasforma in arma di compromissione: così funziona la truffa e come difendersi
È stata ribattezzata Graphalgo la campagna di social engineering mirata contro sviluppatori software attivi nell’ecosistema crypto e blockchain, basata su un sofisticato schema di falso reclutamento. L’obiettivo, oltre al furto di credenziali, è ottenere accesso persistente alle workstation di sviluppo. I dettagli
University of Pennsylvania - 623,750 breached accounts
In October 2025, the University of Pennsylvania was the victim of a data breach followed by a ransom demand, largely affecting its donor database. After the incident, the attackers sent inflammatory emails to some victims. The data was later published online in February 2026 and included 624k unique email addresses alongside names and physical addresses. For some donor records, additional personal information was exposed, including gender and date of birth. A small subset of records also contained religion, spouse name, estimated income and donation history.
Dalla ricerca al mercato globale: la cyber security italiana si misura in Silicon Valley
Il programma Lab2Bay di SERICS accelera l’internazionalizzazione di spin-off e startup cyber. Un ponte tra università, venture capital e industria per trasformare idee ancora nella loro fase iniziale in imprese competitive su scala internazionale
Eurail says stolen traveler data now up for sale on dark web
Eurail B.V., the operator that provides access to 250,000 kilometers of European railways, confirmed that data stolen in a breach earlier this year is being offered for sale on the dark web.
Man arrested for demanding reward after accidental police data leak
Dutch authorities arrested a 40-year-old man after he downloaded confidential documents that had been mistakenly shared by the police and refused to delete them unless he received "something in return."
Infostealer malware found stealing OpenClaw secrets for first time
With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets.