The hacker group LunaLock has added a new element to the classic extortion scheme, preying on the fears of artists and clients. On August 30, a message appeared on the...
LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Following the international operation...
Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is possible to establish decision-making strategies that, in every sector, can...
In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some...
On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely...
At the end of August 2025, a high-impact vulnerability affecting HikCentral Professional, the Hikvision platform used to centrally manage video surveillance and access control, was disclosed. The flaw, classified as...
Zscaler's recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to...
Welcome to the first installment of our series, a three-week journey exploring the extraordinary dance between coevolution, cybersecurity, and the humanities, with a focus on coaching. Each week, we'll tackle...
On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United States House of Representatives.The letter,...
Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does it really mean? What happens...