In recent days, a suspected data breach involving Instagram users has surfaced publicly, generating significant attention. The leaked database allegedly contains information on approximately 17.5 million accounts: a scale that, even without exposed passwords, deserves…
For years, Endpoint Detection and Response (EDR) has been considered one of the main defense technologies against cyber threats, thanks to its ability to provide near real-time visibility and response on endpoints. However, recent ransomware…
In the landscape of cyber threats targeting Italy, a particularly sensitive new incident has emerged: the sale, on a well-known Russian underground forum, of a vast archive containing healthcare data of citizens from Northern Italy….
In recent months, a case has emerged that is reshaping how we view advanced threats. For the first time, a general-purpose artificial intelligence model, Claude AI Code, was exploited as an almost fully autonomous agent…
The recent, high-profile robbery at the Louvre Museum has raised crucial questions—not only about the physical security of priceless artworks, but also about critical gaps in the cybersecurity defenses of institutions that manage assets of…
In many cases, both in the virtual and real world, perceived security does not match actual security. Aligning these two aspects is, in fact, the main goal of security awareness. The use of instant messaging…
When a large-scale service goes offline — as has happened with Amazon Web Services (AWS) — the first reaction is almost always the same: “Are we under attack?” In this case, however, the reality may…
In recent weeks, we have seen a wave of reports about the so-called “receipt scam”: recovered or photographed ATM/POS receipts become the starting point for social engineering attacks that lead to accounts being emptied or…
Cyberoo I-SOC identified an advertisement on a cybercriminal forum for a possible pre-auth exploit for Cisco Firewall Management Center that would allow arbitrary commands to be executed as root on Linux virtual appliances. The author…
In recent years, the criminal ransomware market has been based on a reproducible model: pre-packaged kits, payment infrastructures, and affiliates that run campaigns (RaaS). The emergence of local AI tools changes the attack surface: PromptLock,…