At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear: cyber defense is entering a new era, that...
On September 20, 2025, a cyberattack hit three of Europe's major airports: London Heathrow, Brussels, and Berlin. The digital systems governing check-in and baggage handling were rendered unusable, resulting in...
I have been working for several years as a System Engineer, and one of the tasks I handled was managing Citrix PVS. One of the issues with PVS was investigating...
Cyberspace is no longer a marginal dimension but a true strategic operational domain. Its relevance is now comparable to that of land, sea, air, and space. Technological acceleration driven by...
In recent months, during my research and studies, I have come across a reality as surprising as it is worrying: how easily it is possible to identify exposed systems on...
For a few days now, news has been circulating, which I don't think has been confirmed by official sources, of a ransomware attack carried out through Samsung's "corporate fleet" management...
On September 20, 2025, at 11:52 PM, a thread titled “FRESH FTP LEAK” appeared on DarkForums , posted by user Hackfut . The material allegedly exposed access to FTP servers...
Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on privacy and security . Despite being a work tool, an...
When we talk about cybersecurity, we immediately think of firewalls, malware, and zero-day exploits. But there's a deeper level, unseen and unsurpassed: the laws of mathematics. Because while software can...
A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses...