Sicurezza

Destructive Hacks Against Ukraine Echo Its Last Cyberwar

Pubblicato il

For weeks, the cybersecurity world has braced for destructive hacking that might accompany or presage a Russian invasion of Ukraine. Now, the first wave of those attacks appear to have arrived. While so far on a small scale, the campaign uses techniques that hint at a rerun of Russia’s massively disruptive campaign of cyberwar that […]

Sicurezza

How Apple’s iCloud Private Relay Can Keep You Safe

Pubblicato il

If you pay for iCloud storage, then you automatically have access to the extra perks that Apple bundles together under the iCloud+ name—and one of those perks is the iCloud Private Relay service. If you open the Settings app on your iPhone or iPad, tap your name at the top, and then choose iCloud, you […]

Sicurezza

A Teen Took Control of Teslas by Hacking a Third-Party App

Pubblicato il

On Friday, Russia did the previously unimaginable: It actually arrested a bunch of ransomware operators. Not only that, but members of the notorious group REvil, which has been behind some of the biggest attacks of the past several years, including the ones on IT management firm Kaseya and meat giant JBS. Russian president Vladimir Putin […]

Sicurezza

Russia Takes Down REvil Hackers—as Ukraine Tensions Mount

Pubblicato il

“I think being concerned about Russia’s ulterior motives [for conducting the REvil arrests] is perfectly reasonable,” says John Hultquist, vice president of threat intelligence at the security firm Mandiant. “This essentially is a feather in their cap and you could definitely take a cynical view of it and think that it’s all signaling. But I […]

Sicurezza

North Korean Hackers Stole Nearly $400M in Crypto Last Year

Pubblicato il

The past year saw a breathtaking rise in the value of cryptocurrencies like Bitcoin and Ethereum, with Bitcoin gaining 60 percent in value in 2021 and Ethereum spiking 80 percent. So perhaps it’s no surprise that the relentless North Korean hackers who feed off that booming crypto economy had a very good year as well. […]

Sicurezza

NSO Group Spyware Targeted Dozens of Reporters in El Salvador

Pubblicato il

The Israeli spyware developer NSO Group has long claimed plausible deniability when it comes to misuse of its powerful targeted surveillance tools. Yet despite its protestations—and increased scrutiny from tech companies and regulators alike—the abuses continue. The latest revelation comes from El Salvador, where NSO’s Pegasus malware was found on 37 devices belonging to 35 […]

Sicurezza

Interview: Open Banking Opens Customer Data to Third Parties

Pubblicato il

Many on-premise applications are being moved to cloud and new applications written natively for cloud. These are more likely to use open APIs to support access control, enable mobile usage and support innovative payment services. As a result, scraping and bot attacks on web-facing applications will continue to increase. Bots will be used to block […]

Sicurezza

Apple’s Private Relay Roils Telecoms Around the World

Pubblicato il

When Apple pushed iOS 15 out to more than a billion devices in September, the software update included the company’s first VPN-like feature, iCloud Private Relay. The subscription-only privacy tool makes it harder for anyone to snoop on what you are doing online, by routing traffic from your device through multiple servers. But the tool […]

Sicurezza

2022 Cyber Predictions: Preparing for Future Security Challenges

Pubblicato il

The pandemic and subsequent economic shocks have spawned innovations in technology, including large steps forward in the cloud and edge deployments.  Longtime businesses are reinventing themselves as contactless online-only experiences. According to Radware’s The State of Web Application and API Protection report, 70% of production web applications now run-in cloud environments. This massive shift to […]

Sicurezza

The FTC Wants Companies to Find Log4j Fast. It Won’t Be Easy

Pubblicato il

Such issues are likely to disproportionately affect small and medium businesses, he says—and make it nigh-on impossible to fix easily. Sonatype analysis has found that around 30 percent of the consumption of Log4j is from potentially vulnerable versions of the tool. “Some companies haven’t got the message, don’t have the materials, and don’t even know […]