Phishing attacks are no longer confined to the email inbox, with 34% of phishing attacks now taking place over non-email channels like social media, search engines, and messaging apps. #phishing #linkedin
www.bleepingcomputer.com/news/securit...
@rcinghio.bsky.social
But have you tried turning it off and back on again? No, I have been hacked. π¨βπ» Based in Milan, Italy π€, my heart belongs to Dublin's chips. βοΈπ
Phishing attacks are no longer confined to the email inbox, with 34% of phishing attacks now taking place over non-email channels like social media, search engines, and messaging apps. #phishing #linkedin
www.bleepingcomputer.com/news/securit...
Al Corrierone hanno la memoria corta, perchΓ© a giugno riportavano i dati Oxfam: "Il 5% degli italiani possiede metΓ della ricchezza nazionale: cresce solo il patrimonio di chi Γ¨ giΓ ricco (e i milionari sono 1,3 milioni)." Quindi, quali calli starebbe pestando la sinistra? Non quelli dei poveri.
09.11.2025 19:35 β π 0 π 0 π¬ 0 π 0Multiple Vulnerabilities in Microsoft Teams Have Been Addressed #microsoft #teams #vulnerabilities
blog.checkpoint.com/research/exp...?
Two vulnerabilities affecting both Cisco Secure ASA software and Cisco Secure FTD software, both disclosed and patched in late September 2025, are still being exploited, now in a new attack that can lead to denial of service (DoS). #cisco #vulnerabilities #patch
thehackernews.com/2025/11/cisc...
From August through October 2025, GreyNoise observed a clear ramp-up in exploitation attempts against PHP and PHP-based frameworks as actors push to deploy cryptominers. #php #cryptominer
www.greynoise.io/blog/php-cry...
Google Threat Intelligence Group (GTIG): adversaries are no longer leveraging AI just for productivity gains, they are deploying novel AI-enabled malware in active operations. This marks a new operational phase of AI abuse. #AI #threat
cloud.google.com/blog/topics/...
Come se "musulmano" o "socialista" fossero un insulto, tra l'altro. "Fascista" e "corrotto", invece no. Eppure abbiamo avuto entrambe le categorie al governo per anni grazie alla destra berlusconiana.
05.11.2025 08:09 β π 1 π 0 π¬ 1 π 0The former general manager of a U.S. defense contractor, Peter Williams, has pleaded guilty to selling "eight sensitive and protected cyber-exploit components" to Russian zero-day broker Operation Zero. #exploit #russia #US
cyberscoop.com/peter-willia...
On October 27, 2025 AEST, The Safety research team's automated malicious package detection engine identified a new malicious #NPM package called "@chatgptclaude_club/claude-code". #code #claude
www.getsafety.com/blog-posts/m...
Tortellini neri.
31.10.2025 16:00 β π 0 π 0 π¬ 0 π 0Ernst & Young (EY) inadvertently exposed a massive 4-terabyte SQL Server backup file on Microsoft Azure. #ey #data #exposure
cyberpress.org/ey-data-expo...
The #RediShell RCE #vulnerability, a critical cumulative flaw in Redisβs Lua scripting engine, was publicly disclosed in early October 2025. CVE-2025-49844 is a use-after-free vulnerability that can escape the Lua sandbox and enable host-level remote code execution.
www.criminalip.io/knowledge-hu...
Adobe is giving filmmakers new generative AI audio tools that can quickly add thematically appropriate backing tracks and narration to videos. #adobe #audio #tools #videos
www.theverge.com/news/807809/...
Check Point has published his analysis of the YouTube Ghost Network, a #malware distribution scheme on #YouTube that has posted more than 3,000 maliciously crafted videos purporting to offer pirated software or game cheats, but instead delivering infostealers.
research.checkpoint.com/2025/youtube...
Attackers are now exploiting a critical-severity Windows Server Update Service (WSUS) vulnerability, which already has publicly available proof-of-concept exploit code. #wsus #vulnerability #windows
www.bleepingcomputer.com/news/securit...
Pro-Russia Information Operations Leverage Russian Drone Incursions into Polish Airspace #google #russia
cloud.google.com/blog/topics/...
New report: "Mythical Beasts: Diving into the depths of the global spyware market" #spyware #market
www.atlanticcouncil.org/in-depth-res...
Europol Dismantles Global Cybercrime-as-a-Service Network #europol #cybercrime
www.linkedin.com/pulse/europo...
Newly released framework called Hexstrike-AI provides threat actors with an orchestration βbrainβ, according to Check Point. #AI #threat
blog.checkpoint.com/executive-in...
The winner #ICE #trump
20.10.2025 19:29 β π 0 π 0 π¬ 0 π 0Tim Brown, SolarWinds CISO, spoke at Melbourneβs CyberCon and his observations about the personal impacts are just as real as the SEC lawsuit and drop in the customer renewal rate. #solarwinds
www.theguardian.com/technology/2...
Nice service. FβSecure checks if your private information appears in known data breaches. Email address or breach information wonβt be stored. #databreach #email
www.f-secure.com/en/identity-...
MirrorMask: a tiny code change that silently skims checkout data #data #web #skimming
www.turacolabs.com/post/mirrorm...
Attackers are packaging a highly effective social engineering technique known as ClickFix into easy-to-use phishing kits, making it accessible to a wider range of threat actors. #clickfix #social
unit42.paloaltonetworks.com/clickfix-gen...
"Spudorata", "La Albanese". A parte il linguaggio, vedono nemici ovunque. Ci sarΓ un disegno dietro questo piano editoriale?
08.10.2025 06:51 β π 2 π 0 π¬ 0 π 0Lo prendo come un auspicio, che ci sia davvero un'onda rossa.
07.10.2025 07:01 β π 2 π 0 π¬ 0 π 0Deloitte to pay money back to Albanese government after using AI in $440,000 report. Partial refund to be issued after several errors were found in a report into a departmentβs compliance framework. #deloitte #AI
www.theguardian.com/australia-ne...
CISA and International Partners: Guidance for Securing OT Systems. It is aimed at cyber security professionals working in organisations that deploy or operate OT across greenfield and brownfield deployments.
www.ncsc.gov.uk/collection/o...
Google Threat Intelligence Group (GTIG) has observed a backdoor malware campaign in which threat actors tracked as "UNC5221 and closely related, suspected China-nexus threat clusters," maintained long-term access to various US organizations' systems
cloud.google.com/blog/topics/...