
SSHStalker The return of IRC in the Linux botnets age
Cybersecurity sometimes seems like a temporary loop: techniques and protocols that seemed relegated to the past reappear with new victims. This is precisely the case of the newly …
News about security failures, exploits and vulnerabilities in systems

Cybersecurity sometimes seems like a temporary loop: techniques and protocols that seemed relegated to the past reappear with new victims. This is precisely the case of the newly …

It has recently launched a suplanting campaign that uses as a hook a malicious installer that appears to be 7-Zip, the famous compression program. Instead of simply including the …

Cybersecurity researchers have identified a new family of Ransomware called Reynolds that introduces a dangerous variant of an already known tactic: the so-called "bringing your o…

Security researchers have discovered a worrying variation in the Ransomware operation: a family called Reynolds Reynolds, which directly integrates into its executable an escape c…

Microsoft plans to bring to Windows 11 an idea that phone users know well: pop-up windows that ask for permission before an application access sensitive resources such as the file…

The beginning of 2026 brings news that deserves attention in the security ecosystem: ZAST.AI closed a $6 million pre-A round, led by Hillhouse Capital, bringing its accumulated fu…

In recent weeks, several European public bodies have confirmed that they suffered computer intrusions linked to security failures in a mobile device management tool. These include…

The case of Daren Li exposes, with the crux numbers and geography of crime, how modern scams mix social engineering, digital platforms and global financial channels to convert fal…

In the last decade, the security of the business network has advanced at an accelerated pace: firewalls are smarter, threat detection systems process more signals and access polic…