Researchers Warn of Self-Spreading Malware Targeting Gamers via YouTubeThe Hacker News
Data Breach Registry2022-09-15T19:53:14+02:00Gamers looking for cheats on YouTube are being targeted with links to malicious password-protected archive files designed to install the RedLine Stealer malware and crypto miners on compromised machines. “The videos advertise cheats and cracks and provide instructions on hacking popular games and software,” Kaspersky security researcher Oleg Kupreev said in a new...
5 Ways to Mitigate Your New Insider Threats in the Great ResignationThe Hacker News
Data Breach Registry2022-09-15T16:48:02+02:00Companies are in the midst of an employee “turnover tsunami” with no signs of a slowdown. According to Fortune Magazine, 40% of the U.S. is considering quitting their jobs. This trend – coined the great resignation – creates instability in organizations. High employee turnover increases security risks, and companies are more vulnerable to attacks...
Russian Gamaredon Hackers Target Ukrainian Government Using Info-Stealing MalwareThe Hacker News
Data Breach Registry2022-09-15T16:48:02+02:00An ongoing espionage campaign operated by the Russia-linked Gamaredon group is targeting employees of Ukrainian government, defense, and law enforcement agencies with a piece of custom-made information stealing malware. “The adversary is using phishing documents containing lures related to the Russian invasion of Ukraine,” Cisco Talos researchers Asheer Malhotra and Guilherme...
Cybersecurity, via alla seconda edizione della Fastweb Digital Academy
Data Breach Registry2022-09-16T12:57:17+02:00Candidature aperte fino al 20 settembre per il corso gratuito promosso in collaborazione con la Fondazione Cariplo: 190 ore di lezione per preparare i futuri analyst L'articolo Cybersecurity, via alla seconda edizione della Fastweb Digital Academy proviene da CorCom. Source: Corriere Comunicazioni
Cybercrime, la Regina Elisabetta usata come esca
Data Breach Registry2022-09-16T12:57:19+02:00Proofpoint scopre una campagna phishing che sfruttando la scomparsa della sovrana invita a partecipare a un "hub di tecnologia artificiale" in suo onore. Una trappola veicolata attraverso un finto account Microsoft e votata a rubare credenziali L'articolo Cybercrime, la Regina Elisabetta usata come esca proviene da
Cyber Resilience Act, ecco la legge europea. Vestager: “Più responsabilità per i produttori”
Data Breach Registry2022-09-16T12:57:20+02:00Nero su bianco i requisiti per lo sviluppo, la fabbricazione e l'aggiornamento di software e dispositivi connessi, dai pc agli smartphone fino a tutti quelli per la smart home. Obiettivo: protezione da attacchi hacker e violazioni della privacy L'articolo Cyber Resilience Act, ecco la legge europea. Vestager:...
Webworm Hackers Using Modified RATs in Latest Cyber Espionage AttacksThe Hacker News
Data Breach Registry2022-09-15T15:16:10+02:00A threat actor tracked under the moniker Webworm has been linked to bespoke Windows-based remote access trojans, some of which are said to be in pre-deployment or testing phases. “The group has developed customized versions of three older remote access trojans (RATs), including Trochilus RAT, Gh0st RAT, and 9002 RAT,” the Symantec Threat Hunter...
U.S. Charges 3 Iranian Hackers and Sanctions Several Others Over Ransomware AttacksThe Hacker News
Data Breach Registry2022-09-15T12:25:52+02:00The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Wednesday announced sweeping sanctions against ten individuals and two entities backed by Iran’s Islamic Revolutionary Guard Corps (IRGC) for their involvement in ransomware attacks at least since October 2020. The agency said the cyber activity mounted by the individuals is...
Beni culturali, come proteggere i dati nella trasformazione digitaleFilomena Polito, Daniela Guarenghi e Cesare Costi
Data Breach Registry2022-09-15T10:02:17+02:00Le linee guida ministeriali per la redazione del Data Management Plan sulle attività di digitalizzazione sono il primo passo per riflettere su Data Protection e beni culturali: quali sono i limiti previsti dalla legge e cosa si può ancora migliorare a favore della privacy dei cittadini L’articolo Beni culturali, come proteggere...