
The pointer disappears in Outlook: the failure to check productivity
If in the last few days you have moved the mouse through the classic Outlook window and suddenly you ran out of pointer, you are not the only one: Microsoft has recognized a failu…
News about security failures, exploits and vulnerabilities in systems

If in the last few days you have moved the mouse through the classic Outlook window and suddenly you ran out of pointer, you are not the only one: Microsoft has recognized a failu…

Cybersecurity researchers have unravel a cryptojacking campaign that combines old social engineering tricks with advanced techniques of exploitation and persistence. In the center…

The news of an intrusion in Optimizely has once again put a threat at the centre of the debate that, although not dependent on sophisticated exploits, is extremely effective: soci…

For years, identity was assumed as the cornerstone of security in companies: if the system could verify who was entering, it was assumed that access could be granted without furth…

As organizations adopt and deploy their own large-scale language models, they not only bring up a model to production: they create a whole network of internal services and APIs th…

Roundcube Webmail, the web-based mail client who has been with millions of servers for years and who since 2008 has been integrated as a default interface in cPanel, was again pla…

A new chapter in the long history of attacks on the developer supply chain has come to light and makes it clear that commitment vectors continue to evolve rapidly. Security resear…

A few weeks ago, security investigators re-opened the alarms for the activity of an old acquaintance: the Iranian group known as MuddyWater. According to the analysis published by…

In late 2025 a new malware project aimed at stealing information that drew the attention of researchers: Arkanix Stealer emerged in dark-side forums. In appearance it was a produc…