
Nslookup becomes the driver of the malicious chain
In recent weeks, the security community has again warned about a social engineering tactic that exploits users' confidence in their own running harmful code on their equipment. Mi…
News about technology companies and the tech market

In recent weeks, the security community has again warned about a social engineering tactic that exploits users' confidence in their own running harmful code on their equipment. Mi…

Threat intelligence analysis has detected a concentrated campaign against Ivanti Endpoint Manager Mobile (EPMM) in which a single actor appears to be behind most active holdings o…

The computer security scene has been warning for months about suplanting campaigns linked to job offers, but the latest public report raises the deception to another category: att…

In recent weeks, a campaign has been detected that combines two very current vectors: results sponsored by search engines and public content generated by language models. The atta…

Google Threat Intelligence Group (GTIG) has identified an undocumented threat actor, responsible for a series of intrusions directed against Ukrainian organizations and grouped un…

Recently, the South Korean authority responsible for protecting personal data imposed millionaire fines on three luxury brands in the LVMH group: Louis Vuitton, Christian Dior Cou…

The companies and contractors involved in the defence industry are receiving increasing attention from state actors, hackers and criminal gangs, and this is not an isolated phenom…

The integration between Criminal IP and IBM's security platform marks a practical step towards more agile and context security operations. By connecting the IP-based threat intell…

The US Cybersecurity and Infrastructure Agency. US (CISA) has given an alarm touch: it has demanded federal agencies to ensure their environments in the face of critical vulnerabi…