L’ethical hacking is a practice in which a cybersecurity professional uses the same techniques used…
Exploit on Chrome, here is the first patch of 2024: what is it?
January 18, 2024
Google intervened to stem the first vulnerability of Chrome of the 2024. The flaw, cataloged…
Il boot via PXE (Preboot Execution Environment) is a method that allows a computer to…
Naz.API, what is the attack that revealed millions of passwords
January 18, 2024
Have you also received an email with the following message “You’re one of 70,840,771 people…
A recent investigation conducted by the cybersecurity company Trail of Bits led to the discovery…
Phishing attack hits Coinbase: crypto wallets dried up
January 17, 2024
Thanks to the work of the researchers at Group-IB it was possible to identify cybercriminals…
Some researchers of Bishop Fox engaged in the context of cybersecurity they discovered a potential…
Phemedrone malware affects Windows using a SmartScreen exploit
January 16, 2024
Tend Micro researchers, through a report, wanted to warn Windows users of a new danger….
FBot malware: payment and cloud services at risk of attack
January 15, 2024
A new malicious agent, named, is causing considerable concern FBotwhich is targeting cloud and payment…
The good old adage “never open attachments and documents from untrustworthy sources” is always relevant…