Last pills
WinRAR under attack: critical vulnerability threatens millions of Windows usersA vulnerability in ACE files puts the security of millions of Windows users at risk
Brother under scrutiny: critical vulnerability in printer firmwareIncreasing risks for cybersecurity in offices and companies with vulnerable devices
Zero-click threats: how a bug in Notepad++ opens new doors to cybercrimeAn in-depth analysis of the emergence of invisible threats in everyday use apps
Cyberattack in South Tyrol marks the beginning of a new era in digital securityA digital attack reveals the challenges and solutions for security in the south tyrolean territory
Microsoft extends security support for Windows 10 until 2026One more year for updates and security between innovation and operational stability
WhatsApp removed from official devices of the U.S. House of representatives for security reasonsProtecting institutional communications by avoiding digital vulnerabilities in sensitive environments
Cyber attack prevention
Online security: the transformation from SSL to TLS and their historical impactFrom corporate competition to global standardization of web cryptography
Innovative defenses against DDoS attacks in the global financial sectorAdvanced technologies and strategies to protect data and services in the financial world
Managing new zero-day threats on Chrome with automation and AIAdvanced strategies to protect IT infrastructures using automation and artificial intelligence
Critical vulnerability in WordPress plugins threatens IT securityProactive defense with AI and automations to Protect WordPress Environments from emerging threats
Advanced cybersecurity: dismantling of Conti and TrickBot thanks to AI and international forcesGlobal synergies and AI technologies to neutralize the most advanced ransomware threats
AvCheck dismantled: a severe blow to malware testing platformsInternational collaboration against platforms supporting cybercrime
Cyber incidents
Cloudflare and the timely management of a global infrastructure crisisEffective management and transparency in technological emergencies on a global scale
North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures
Global cybersecurity between business Interests and geopolitical challengesTailored cyber threats and the new challenges in global digital defense
Cybersecurity in hospitals: protecting sensitive data with AI and automationsTechnological strategies to strengthen hospital infrastructures against advanced digital threats
Sophisticated phishing targets Instagram head, challenges for IT expertsDigital security at risk, advanced strategies to counter targeted attacks and phishing
Cybersecurity and data protection in digital promotions: lessons and strategiesAdvanced strategies to protect sensitive data in digital marketing campaign
Cyber threats
BadBox: how compromised Android devices threaten corporate networksHidden threats in Android firmware and Advanced strategies for enterprise protection
Crocodilous 2025: new challenges for the security of voice communicationsAdvanced defense and automation to counter mimetic fraudulent calls
Asyncrat in Italy: the new malware that challenges traditional defensesAdvanced steganography techniques and effective strategies for defense against emerging threats
Advanced cybersecurity for AI containers: challenges and technological solutionsChallenges and innovative solutions to ensure the security of containerized AI infrastructures
Skitnet and the new frontier of automated cyber defenseAutomation and AI as strategic levers for the cybersecurity of the professional future
Revelations on the VanHelSing ransomware: new weapons for IT defenseLeverage in-depth analysis to enhance security through AI and integrated automation
Cybersecurity events
Innovations and advanced solutions for digital security at Cybsec-ExpoPiacenza takes center stage in cybersecurity with a focus on AI, automations, and professional networking
Pwn2Own Berlin 2025: the most surprising hacks and record prizes for advanced IT securityZero-day discoveries on critical systems, innovative exploits in AI and virtualization, and million-dollar rewards that mark a new era in cybersecurity for advanced IT professionals
Innovations and challenges of Cyber Security & Cloud Expo Europe 2024 in AmsterdamTrends and strategies that are redefining cybersecurity and cloud computing in 2024
Meet experts and innovations at the Cyber Security & Cloud Expo Europa 2024 in AmsterdamInnovative concepts and unique opportunities: discover the best of cybersecurity and cloud computing
The importance of the CyberDSA event for digital security in Southeast AsiaSoutheast Asia's leading cybersecurity event between international cooperation and technological innovation
Botswana Cyber Revolution Summit 2024 announcementGlobal experts gather to define the future of cybersecurity in the heart of Africa
Cybersecurity legislation
5 million fine for Replika: privacy lessons for chatbot developersRecord fine for serious GDPR violations, new standards for chatbots and personal data management
Multimillion fine imposed on Replika for GDPR violations and data management issuesImplications for developers and integrators in complying with european privacy regulations
Data protection in clinical trials: tech solutions and regulations for a safe future of researchDiscover how innovative technologies and rigorous regulations combine to ensure privacy and efficiency in the management of personal data in digital clinical trials
Serious GDPR violations: Cegedim Santè fined a million dollars, reveals flaws in health data privacyScandal in healthcare data management: how Cegedim Santè violated GDPR and put patients' privacy at risk
AI Act: new rules that will change the future of technologyNew rules for artificial intelligence: how the AI Act will change the technological and industrial landscape in Europe. Discover the challenges, opportunities and importance of international cooper...
Digital revolution in Switzerland: PA opens source code and promotes open sourceFind out how Switzerland is transforming digital transparency in public administration and reducing dependence on proprietary software