Security Fake iPhone lock mode exploited to spread malwareDecember 6, 2023Thanks to the work of cybersecurity researchers at Jamf Threat Labs it was possible to… Read more
Security Malware and IoT, concern is growing: cases quadrupleDecember 6, 2023When it comes to technology and everyday life, PC e smartphone they represent only a…
Security Fake phishing campaign pushes WordPress users to install malwareDecember 5, 2023For cybercriminals, gaining access to legitimate websites to corrupt and exploit them for their own…
Security Android: December security patch arrives, critical vulnerabilities fixedDecember 5, 2023Just as Google CEO, Sundar Pichai, warns the public of the dangers of apps outside…
Security Yontoo Malware, Your Web Browser's Nightmare: How to Avoid InfectionDecember 5, 2023When it comes to browser Webfew malicious agents can be as annoying to deal with…
Security Russian APT28 Hackers Attack Outlook: What's Happening?December 5, 2023Yesterday Microsoft revealed suspicious activity in the context of an exploit of Outlook. Campaign manager…
Security Google, a new method to block unwanted numbersDecember 5, 2023In turn, everyone found themselves in situations where it was necessary block a number unknown…
Security Malvertising, Danabot, Storm-0216 and Cactus: Microsoft raises the alarmDecember 5, 2023The warning comes directly from Microsoft: through its official channels, in fact, the IT giant…
Security 20,000 Microsoft Exchange servers at risk of cyber attackDecember 5, 2023A new report from ShadowServer Foundation revealed a very worrying reality in the context of…
Security P2Pinfect malware, wave of attacks: IoT devices in the crosshairsDecember 5, 2023Cado Security Labs researchers were able, through their work, to identify a new and fearsome…