
The combined IA scam and ads that steal data in macOS
In recent weeks, a campaign has been detected that combines two very current vectors: results sponsored by search engines and public content generated by language models. The atta…
News about viruses, Ransomware, Trojans and other malicious software

In recent weeks, a campaign has been detected that combines two very current vectors: results sponsored by search engines and public content generated by language models. The atta…

Google Threat Intelligence Group (GTIG) has identified an undocumented threat actor, responsible for a series of intrusions directed against Ukrainian organizations and grouped un…

Recently, the South Korean authority responsible for protecting personal data imposed millionaire fines on three luxury brands in the LVMH group: Louis Vuitton, Christian Dior Cou…

The companies and contractors involved in the defence industry are receiving increasing attention from state actors, hackers and criminal gangs, and this is not an isolated phenom…

In recent weeks the security community has re-lit the alarms on a silent enemy that many users underestimate: browser extensions. What at first sight seems small profits to save t…

In December 2025, npm applied a profound change in its authentication system to reduce the risk of supply chain attacks: it revoked the so-called "classic tokens" and promoted ses…

Microsoft has solved a known failure in its parental control service Family Safety that, for months, prevented many Windows users from opening Google Chrome and other browsers. Th…

For decades, direct access .lnk has been part of the Windows ecosystem: they arrived with Windows 95 and since then their binary format has grown in complexity. This complexity is…

Cybersecurity researchers have raised the alarm for a coordinated campaign that is using public package repositories - npm and PyPI - as a vector to engage developers and job cand…