Security Malware that bypasses antivirus? Here's how to outsmart themNovember 10, 2023The user base you can count on Android It is huge. At present, it is… Read more
Security Stanford University hit by ransomware: 430 GB of data stolenNovember 10, 2023The group Akira ransomware claimed responsibility for an attack againstStanford University resulting in theft of…
Security QWAC and eIDAS 2.0 certificates: what they are and why security can go back 12 yearsNovember 9, 2023On 8 November 2023, the European Commission and the Council of the European Union confirmed…
Security Zero Trust? Because you can't do without it even on the public cloudNovember 9, 2023In recent years more and more companies have relied on public cloud, leveraging the power…
Security Ransomware: Beware of new Initial Access techniquesNovember 9, 2023The attacks ransomware they represent one of the most feared digital threats, both by ordinary…
Security The new variant of the Jupyter infostealer is even more dangerousNovember 9, 2023The researchers of VMware have identified and analyzed a new variant of the malware Jupyterand…
Security Silent Ransom and callback phishing: the FBI warningNovember 9, 2023A worrying campaign ransomware has been spreading in recent weeks, with such a level of…
Security BlazeStealer malware detected in Python packages on PyPINovember 9, 2023Thanks to the work of the researchers at Checkmarx it was possible to identify a…
Security Why are overworking cybersecurity experts a danger?November 8, 2023When it comes to cybersecurity expertswe are referring to experts in the sector who carry…
Security BlackSuit Ransomware: A Big Threat to the Healthcare IndustryNovember 8, 2023L’Health Sector Cybersecurity Coordination Center (HC3), an American organization that deals with cybersecurity and healthcare,…