National security veterans warn against delays in FISA 702 reauthorization
Iran recluta cyber criminali russi: nuova escalation nella guerra cibernetica globale
Secondo un report di intelligence, Teheran starebbe integrando attori criminali nelle proprie operazioni offensive per colpire obiettivi USA. Torna Pay2Key in versione “pseudo-ransomware” e cresce l’ambiguità tra cybercrime e attività statali. Ecco quali nuovi rischi introduce la convergenza tra stato e criminalità
Dall’app virale ai mal di testa globali: quando il successo diventa un problema legale
Chiunque fornisca un servizio ha la responsabilità di apprendere i requisiti legali si applicano alla propria situazione e soddisfare tutti quelli di conformità. Ecco una guida pratica per navigare la complessità normativa globale e trasformarla in vantaggio competitivo
Massachusetts hospital turning ambulances away after cyberattack
Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins
An international operation from law enforcement authorities in partnership with private companies has disrupted FrostArmada, an APT28 campaign hijacking local traffic from MikroTik and TP-Link routers to steal Microsoft account credentials.
UK exposes Russian cyber unit hacking home routers to hijack internet traffic
Why Your Automated Pentesting Tool Just Hit a Wall
Automated pentesting tools deliver strong early results, then quickly plateau. Picus Security explains how the "PoC cliff" leaves major attack surfaces untested and creates a dangerous validation gap.
Cyberattack on telecom giant Rostelecom disrupts internet services across Russia
Cyberattack hits Northern Ireland’s centralized school network, disrupting access for thousands
Talos Takes: 2025's ransomware trends and zombie vulnerabilities
In this episode of Talos Takes, Amy and Pierre Cadieux unpack the ransomware and vulnerability trends that defined 2025.
ClickFix Meets AI: A Multi-Platform Attack Targeting macOS in the Wild
How attackers used Claude and other AIs to deliver macOS malware — and what ANY.RUN's new interactive sandbox reveals about the attack chain.
Aggiornamenti Android aprile 2026: corrette solo due vulnerabilità, ma “meno” non significa “meglio”
Google pubblica l’Android Security Bulletin di aprile 2026 che corregge solo due vulnerabilità contro le 129 del mese scorso, ma una delle due riguarda StrongBox, il sottosistema di sicurezza hardware che custodisce chiavi crittografiche, credenziali e dati biometrici nei dispositivi Android più recenti. Ecco i dettagli
Year in Review: Vulnerabilities old and new and something React2
The year was characterized by an unending beat-down on infrastructure that relied on older enmeshed dependencies (e.g., Log4j and PHPUnit), while React2Shell rocketed to the highest percentage of attacks for the entire year within the last three weeks of 2025.
The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines
Cisco Talos has recently observed an increase in activity that is leveraging notification pipelines in popular collaboration platforms to deliver spam and phishing emails.
Esposto il codice sorgente di Claude: ecco i rischi per l’erroneo rilascio da parte di Anthropic
Il caso della pubblicazione per errore di Claude Caude accende i fari su temi cruciali per la cyber security moderna: la gestione dei rilasci software, la protezione della proprietà intellettuale e i rischi connessi all'adozione massiva di strumenti di sviluppo automatizzato
Child Safety at Risk as EU CSAM Detection Law Lapses, Reporting Concerns Rise
EU legal gap on CSAM detection threatens child safety, weakens reporting, and risks rise in child sexual exploitation across digital platforms.
Dal progetto al processo: i 5 errori che bloccano la sicurezza
Governare il passaggio da progetto a processo significa gestire persone, ruoli, responsabilità e il cambiamento culturale che ne consegue. Ecco gli errori e le pratiche per passare dal “fare” al “funzionare”
Common Entra ID Security Assessment Findings – Part 3: Weak Privileged Identity Management Configuration
Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs
The exposure of a suspected leader behind the REvil ransomware gang is a rare win for law enforcement.
EvilTokens: an AI-augmented Phishing-as-a-Service for automating BEC fraud – Part 2
Explore how EvilTokens uses AI-driven features to automate and scale BEC workflows. Uncover the PhaaS operations on Telegram.
FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE
CVE-2026-35616 and CVE-2026-21643 expose FortiClientEMS to SQL Injection and RCE attacks, with active exploitation observed in the wild.
$20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report
The FBI Internet Crime Report 2025 highlights a shift in how cybercrime operates today.
German authorities identify REvil and GandCrab ransomware bosses
The Federal Police in Germany (BKA) has identified two Russian nationals as the leaders of GandCrab and REvil ransomware operations between 2019 and 2021.
German authorities identify REvil and GangCrab ransomware bosses
The Federal Police in Germany (BKA) has identified two Russian nationals as the leaders of GandCrab and REvil ransomware operations between 2019 and 2021.
New GPUBreach attack enables system takeover via GPU rowhammer
A new attack, dubbed GPUBreach, can induce Rowhammer bit-flips on GPU GDDR6 memories to escalate privileges and lead to a full system compromise.
Crypto Phishing and the Human Layer: The Real Weakness Is People
FBI: Cyber fraud surges to $17.6 billion in losses as scams, crypto theft soar
Medusa ransomware group using zero-days to launch attacks within 24 hours of breach, Microsoft says
Big tech vows to continue CSAM scanning in Europe despite expiration of law allowing it
Microsoft fixes Classic Outlook bug causing email delivery issues
Microsoft has resolved a known issue that was preventing some Classic Outlook users from sending emails via Outlook.com.