
Skynet is coming: the malware that attacks Artificial Intelligence!
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not
By Aldo Di Mattia, Director of Specialized Systems Engineering and Cybersecurity Advisor Italy and Malta at Fortinet After years of defining new regulatory strategies, the
Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered
The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewthe abundance of information
A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365’s Direct Send feature. The campaign, which began in May 2025 and has
WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, this bug allowed malware to be executed
This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article
TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via
Citrix has reported a new critical vulnerability in its NetScaler appliances, already actively exploited by attackers. The problem is identified with the identifier CVE-2025-6543 and
We continue our series of articles on IABs by writing about an Iranian cyber contractor that not only works as an initial access broker but