Maurizio
Massasso.it

Galaverna 2022

Torna all’indice gallerie

Maurizio Massasso

17 Dicembre 2022

Cyber News

  • CyberSecurity360
  • Agenzia Cybersicurezza Nazionale
  • Bleepingcomputer
  • Have I Been Pwned?
  • The Hacker News

Con la pubblicazione in GU di un nuovo Dpcm, l’Italia si è dotata di una strategia di difesa contro le minacce ibride rafforzando il ruolo del CISR e ottimizzando il [...]

C’è intesa tra Consiglio e Parlamento UE sulla proposta di semplificazione di alcune norme relative all'AI. La proposta rientra nel pacchetto legislativo "Omnibus VII"dell'agenda di semplificazione europea. L’intento è quello [...]

Un'operazione sotto falsa bandiera svela come l’APT MuddyWater affiliato al governo di Teheran abbia sfruttato l'ecosistema criminale del ransomware-as-a-service per condurre spionaggio geopolitico e prepararsi a future operazioni offensive. È [...]

Per rendere le password memorizzabili, gli utenti tendono a seguire schemi ricorrenti: un modello talmente comune che gli attaccanti non hanno bisogno di attacchi brute force. Ecco le soluzioni per [...]

L'Agcom ha introdotto le numerazioni brevi a tre cifre come identificativo del chiamante per operatori, imprese e call center che agiscono nell’alveo della legalità. Ecco perché è importante riconoscere le [...]

Aggiornamenti di sicurezza risolvono molteplici vulnerabilità, di cui 6 con gravità “alta”, in Next.js, noto framework javascript per la creazione di applicazioni web. Tali vulnerabilità, qualora sfruttate, potrebbero consentire a [...]

Aggiornamenti di sicurezza sanano 12 nuove vulnerabilità, con gravità "critica" e per le quali risultano disponibili PoC pubblici, nella libreria open-source ‘vm2’, componente di Node.js usato per eseguire codice JavaScript [...]

Rilevata una nuova vulnerabilità con gravità “alta”, in alcuni prodotti Hikvision. Tale vulnerabilità potrebbe consentire ad un utente malevolo, in possesso di credenziali valide, l’esecuzione di comandi arbitrari sui dispositivi [...]

Questo CSIRT ha recentemente rilevato una campagna di phishing, veicolata tramite messaggi whatsapp finalizzata a indurre le potenziali vittime a consultare un presunto insoluto relativo al pedaggio autostradale e a [...]

Disponibile un Proof of Concept (PoC) per lo sfruttamento della vulnerabilità denominata Dirty Frag, identificata tramite la CVE-2026-43284, presente nel Kernel Linux. La vulnerabilità interessa i moduli esp4 ed esp6 [...]

The website for the popular JDownloader download manager was compromised earlier this week to distribute malicious Windows and Linux installers, with the Windows payload found deploying a Python-based remote access trojan. [...]

A malicious Hugging Face repository that reached the platform's trending list impersonated OpenAI's "Privacy Filter" project to deliver information-stealing malware to Windows users. [...]

NVIDIA has confirmed in a statement for BleepingComputer that GeForce NOW user information has been exposed in a data breach. [...]

Attackers move faster than overwhelmed SOC teams can realistically investigate alerts. Prophet Security breaks down how AI can help analysts investigate alerts faster and focus on real threats. [...]

The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the [...]

In April 2026, the fashion brand Zara was among a number of organisations targeted by the ShinyHunters extortion group as part of their "pay or leak" campaign. The group claimed [...]

In March 2026, the AI-driven merchant data platform Woflow was named as a victim by the ShinyHunters data extortion group. The group subsequently published tens of thousands of files allegedly [...]

In April 2026, the commercial residential and ISP proxy network LegionProxy suffered a data breach. The incident exposed 10k email addresses, bcrypt password hashes, names and purchases. [...]

In April 2026, the ShinyHunters extortion group listed Vimeo on their extortion portal as part of their "pay or leak" campaign. They subsequently published hundreds of gigabytes of data, predominantly [...]

In April 2026, the gaming community Reborn Gaming suffered a data breach due to a vulnerability in cPanel and WebHost Manager (WHM). The breach exposed 126 unique email addresses along [...]

cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now

cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation, code execution, and denial-of-service. The list of [...]

TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms

Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbed TCLBANKER that's capable of targeting 59 banking, fintech, and cryptocurrency platforms. The activity is being tracked by Elastic Security [...]

Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone number, only to trick [...]

One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches

The hardest part of cybersecurity isn't the technology, it’s the people. Every major breach you’ve read about lately usually starts the same way: one employee, one clever email, and one [...]

Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such [...]

  1. Loading Mastodon feed...