
Eight exploited KEV vulnerabilities require immediate parking
The US Agency for Infrastructure and Cybersecurity. US (CISA) has recently added eight vulnerabilities to its catalogue of Known Exploited Vulnerabilities (KEV), a clear sign that…
News related to computer security, privacy and data protection

The US Agency for Infrastructure and Cybersecurity. US (CISA) has recently added eight vulnerabilities to its catalogue of Known Exploited Vulnerabilities (KEV), a clear sign that…

Last Saturday the crypt community woke up with news that once again put on the table a recurring problem: KelpDAO's wallets were emptied in an operation that, according to the fir…

A recent research report has uncovered a campaign that sought to empty cryptomoneda portfolios through fraudulent applications hosted in the Apple App Store. Security researchers …

The recent findings of Check Point Research put on the table a disturbing reality: a net based on the SystemBC proxy with more than 1,570 active machines has been identified as pa…

Microsoft has launched a warning that should be taken seriously: attackers are exploiting Microsoft Teams' external collaboration functionality to impersonate IT staff or helpdesk…

It is easy to understand why data loss conversations focus on the ansomware and other cyber attacks: they are spectacular, media and often devastating. But that exclusive look lea…

If you use Windows 11 and are in the Insider program, you are likely to have noticed small but relevant changes in file browser behavior: Microsoft is deploying settings intended …

This week some users found that Microsoft Teams' desktop client was not finished starting: the application was left on the loading screen and showed a warning that indicated probl…

In recent weeks, the security community has turned on the alarms after finding a malware family that, because of its design and the conditions it imposes to activate, seems specif…