Flaws in popular VSCode extensions expose developers to attacks
Flaws in popular VSCode extensions expose developers to attacks
Vulnerabilities with high to critical severity ratings affecting popular Visual Studio Code (VSCode) extensions collectively downloaded more than 128 million times could be exploited to steal local files and execute code remotely.
·bleepingcomputer.com·
Flaws in popular VSCode extensions expose developers to attacks
Chinese hackers exploiting Dell zero-day flaw since mid-2024
Chinese hackers exploiting Dell zero-day flaw since mid-2024
A suspected Chinese state-backed hacking group has been quietly exploiting a critical Dell security flaw in zero-day attacks that started in mid-2024.
·bleepingcomputer.com·
Chinese hackers exploiting Dell zero-day flaw since mid-2024
Notepad++ boosts update security with ‘double-lock’ mechanism
Notepad++ boosts update security with ‘double-lock’ mechanism
Notepad++ has adopted a "double-lock" design for its update mechanism to address recently exploited security gaps that resulted in a supply-chain compromise.
·bleepingcomputer.com·
Notepad++ boosts update security with ‘double-lock’ mechanism
针对叙利亚军人的复合式攻击活动分析
针对叙利亚军人的复合式攻击活动分析
此次针对向叙利亚军人的复合式攻击具有迷惑性强,破坏性大,难以追踪的特点,一旦感染,甚至威胁到受害者及其家人的生命财产安全。
·secrss.com·
针对叙利亚军人的复合式攻击活动分析
Microsoft Teams outage affects users in United States, Europe
Microsoft Teams outage affects users in United States, Europe
​Microsoft is working to resolve an ongoing outage affecting Microsoft Teams users, causing delays and preventing some from accessing the service.
·bleepingcomputer.com·
Microsoft Teams outage affects users in United States, Europe
What 5 Million Apps Revealed About Secrets in JavaScript
What 5 Million Apps Revealed About Secrets in JavaScript
Leaked API keys are nothing new, but the scale of the problem in front-end code has been largely a mystery - until now. Intruder's research team built a new secrets detection method and scanned 5 million applications specifically looking for secrets hidden in JavaScript bundles. Here's what we learned.
·bleepingcomputer.com·
What 5 Million Apps Revealed About Secrets in JavaScript
Il malware che ruba password e ambienti delle IA locali
Il malware che ruba password e ambienti delle IA locali
Hudson Rock è un’azienda specializzata in sicurezza informatica che si è imbattuta (probabilmente) per prima in un’interessante evoluzione nel mondo degli infostealer. Per la prima volta, infatti, è stato trovato un malware che prende di mira non soltanto l’identità “umana”, ma anche l’identità operativa di un assistente software. Il payload, infatti, ha esfiltrato l’intero ambiente …
·securityinfo.it·
Il malware che ruba password e ambienti delle IA locali
New Keenadu backdoor found in Android firmware, Google Play apps
New Keenadu backdoor found in Android firmware, Google Play apps
A newly discovered and sophisticated Android malware called Keenadu has been found embedded in firmware from multiple device brands, enabling it to compromise all installed applications and gain unrestricted control over infected devices.
·bleepingcomputer.com·
New Keenadu backdoor found in Android firmware, Google Play apps
A Closer Look at Malicious SVG Phishing
A Closer Look at Malicious SVG Phishing
In recent investigations, Binary Defense researchers observed multiple phishing campaigns abusing SVG files. Much like other modern phishing techniques, these campaigns rely less on obvious malware and more on abusing legitimate functionality in unexpected ways.
·binarydefense.com·
A Closer Look at Malicious SVG Phishing
Smetti di contare i virus bloccati: le uniche 3 metriche che interessano al CdA
Smetti di contare i virus bloccati: le uniche 3 metriche che interessano al CdA
Per tradurre il rischio cyber in impatto finanziario il CISO deve necessariamente imparare la lingua del business e fornire le giuste formule economiche e ottenere finalmente il budget necessario dal Board. Ecco alcuni consigli operativi
·cybersecurity360.it·
Smetti di contare i virus bloccati: le uniche 3 metriche che interessano al CdA
Трояны Android.Phantom заражают смартфоны через игры и пиратские моды, используя ИИ и видеотрансляции для накрутки кликов
Трояны Android.Phantom заражают смартфоны через игры и пиратские моды, используя ИИ и видеотрансляции для накрутки кликов
Эксперты «Доктор Веб» выявили семейство Android.Phantom — трояны распространяются через мобильные игры и модифицированные версии популярных приложений, используют машинное обучение и WebRTC для удаленного управления браузером, накрутки кликов и скрытого сбора данных пользователей
·comss.ru·
Трояны Android.Phantom заражают смартфоны через игры и пиратские моды, используя ИИ и видеотрансляции для накрутки кликов
Il Cloud Security Report 2026 di Fortinet rivela un divario di complessità
Il Cloud Security Report 2026 di Fortinet rivela un divario di complessità
I dati contenuti in questo rapporto tracciano un quadro chiaro: affinché le imprese possano disporre della cloud security più efficace, devono concentrarsi sulla risoluzione delle principali problematiche attuali. Ecco quali
·cybersecurity360.it·
Il Cloud Security Report 2026 di Fortinet rivela un divario di complessità
Analisi di un C2 per OSX
Analisi di un C2 per OSX
Stavo cercando un documento in PDF per mio figlio, una delle tante ricerche, ed uno dei risultati di ricerca era questo sito (ancora online al momento della pubblicazione del post): Screenshot del …
·roccosicilia.com·
Analisi di un C2 per OSX
Poland arrests suspect linked to Phobos ransomware operation
Poland arrests suspect linked to Phobos ransomware operation
Polish police have detained a 47-year-old man suspected of ties to the Phobos ransomware group and seized computers and mobile phones containing stolen credentials, credit card numbers, and server access data.
·bleepingcomputer.com·
Poland arrests suspect linked to Phobos ransomware operation
Think You’re Too Small to Be Hacked? NCSC Says Think Again
Think You’re Too Small to Be Hacked? NCSC Says Think Again
Cyber Essentials framework is one example of how public institutions are trying to raise the floor for cyber resilience across the private sector.
·thecyberexpress.com·
Think You’re Too Small to Be Hacked? NCSC Says Think Again
Ireland now also investigating X over Grok-made sexual images
Ireland now also investigating X over Grok-made sexual images
Ireland's Data Protection Commission (DPC), the country's data protection authority, has opened a formal investigation into X over the use of the platform's Grok artificial intelligence tool to generate non-consensual sexual images of real people, including children.
·bleepingcomputer.com·
Ireland now also investigating X over Grok-made sexual images
Come evolvono le truffe telefoniche in Italia
Come evolvono le truffe telefoniche in Italia
Sempre più impeccabili nei contenuti e sempre più mirate. Un’ondata di telefonate a cui seguono messaggi WhatsApp aiuta a comprendere il nuovo corso delle truffe telefoniche e quali strumenti usare per scongiurare il peggio
·cybersecurity360.it·
Come evolvono le truffe telefoniche in Italia