Phishing succeeds not because users are careless, but because attackers exploit human timing, context, and emotion. Flare shows how modern phishing has become industrialized, scalable, and increasingly hard to spot.
Hackers exploit security testing apps to breach Fortune 500 firms
Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such as DVWA, OWASP Juice Shop, Hackazon, and bWAPP, to gain access to cloud environments of Fortune 500 companies and security vendors.
Termini perentori per le sanzioni GDPR: la sentenza della Cassazione che cambia tutto
La Corte di Cassazione con una recente sentenza si pronuncia su una annosa questione, e non solo in teoria, concernente la natura dei termini entro i quali l’Autorità Garante per la protezione dei dati deve, a pena di decadenza, emettere il provvedimento sanzionatorio. Vediamo il ragionamento
Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026
Security researchers have hacked the Tesla Infotainment System and earned $516,500 after exploiting 37 zero-days on the first day of the Pwn2Own Automotive 2026 competition.
NIS 2 e gestione incidenti: correre all’ultimo minuto significa non essere pronti
In varie aziende e PA l’avvicinarsi di gennaio 2026, periodo di avvio dell’obbligo di notifica degli incidenti di sicurezza all’ACN, ha prodotto una corsa affannosa alla redazione di procedure “di facciata”: documenti formalmente corretti, ma lontani dalla logica operativa della NIS 2. Invece, serve meno carta e più capacità reale di governo dell’incidente
In November 2025, the Everest ransomware group claimed Under Armour as a victim and attempted to extort a ransom, alleging they had obtained access to 343GB of data. In January 2026, customer data from the incident was published publicly on a popular hacking forum, including 72M email addresses. Many records also contained additional personal information such as names, dates of birth, genders, geographic locations and purchase information.
Zero Trust e AI, i punti deboli di un connubio che sembra ineffabile
I sistemi Zero Trust supportati dalle AI sono una negazione in termini. Infatti, tendono a estendere il concetto di fiducia a quelle intelligenze artificiali alle quali, almeno per principio, occorrerebbe guardare con sospetto per la salvaguardia della sicurezza. Come uscire da questa impasse. Molto pericolosa
OpenAI's ChatGPT Atlas browser is testing actions feature
Chromium-based ChatGPT Atlas browser is testing a new feature likely called "Actions," and it can also understand videos, which is why you might see ChatGPT generating timestamps for videos.
Google says Gemini won’t have ads, as ChatGPT prepares to add them
OpenAI recently rolled out ads to ChatGPT in the United States if you use $8 Go subscription or a free account, but Google says it does not plan to put ads in Gemini.
ACF plugin bug gives hackers admin on 50,000 WordPress sites
A critical-severity vulnerability in the Advanced Custom Fields: Extended (ACF Extended) plugin for WordPress can be exploited remotely by unauthenticated attackers to obtain administrative permissions.
VoidLink cloud malware shows clear signs of being AI-generated
The recently discovered cloud-focused VoidLink malware framework is believed to have been developed by a single person with the help of an artificial intelligence model.
EU plans cybersecurity overhaul to block foreign high-risk suppliers
The European Commission has proposed new cybersecurity legislation mandating the removal of high-risk suppliers to secure telecommunications networks and strengthening defenses against state-backed and cybercrime groups targeting critical infrastructure.
Simulare per difendersi: come i cyber digital twin rivoluzionano la sicurezza informatica
I cyber digital twin rivoluzionano la sicurezza: repliche digitali sempre aggiornate delle infrastrutture per simulare attacchi senza impattare la produzione. La difesa passa da reattiva a predittiva con enormi vantaggi per le PMI: test continui, prioritizzazione delle vulnerabilità e tempi ridotti
Gemini AI assistant tricked into leaking Google Calendar data
Using only natural language instructions, researchers were able to bypass Google Gemini's defenses against malicious prompt injection and create misleading events to leak private Calendar data.
Minacce hi-tech e geopolitiche: nuove sfide per i cyber leader
L'anno appena cominciato presenta un panorama di rischio sempre più complesso in termini di cyber security e di instabilità geopolitica. Analizziamolo insieme
Microsoft PowerToys adds new CursorWrap mouse 'teleport' tool
Microsoft has released PowerToys 0.97, with a new mouse utility for multi-monitor setups and significant improvements to the Command Palette quick launcher.
SCANT: A (kind-of-decent) Framework for Ethical Deepfake Creation & Distribution
Contents
1. The Ethical Blueprint: Building Trust in Synthetic Media
1. S - Social Benefit
2. C - Consent
3. A - Accountability
4. N - Non-Deception
5. T - Transparency
2. Putting SCANT into Practice
3. TL;DR Checklist
4. It takes work!
5. AI - Embracing the Human
6. Speaking of ISO 42001
The Ethical Blueprint: Building Trust in Synthetic Media
Lots of damage has been done with AI, and to keep from deep-sixing the forward-leaning tone I want in this article, I’ll re
Make Identity Threat Detection your security strategy for 2026
Identity-based attacks are one of the primary paths attackers use to breach corporate networks. Tenfold shows how Identity Threat Detection helps spot suspicious account activity before real damage occurs.