Last pills
Sophisticated phishing targets Instagram head, challenges for IT expertsDigital security at risk, advanced strategies to counter targeted attacks and phishing
5 million fine for Replika: privacy lessons for chatbot developersRecord fine for serious GDPR violations, new standards for chatbots and personal data management
Evolution of Have I Been Pwned for integrated and automated IT securityAutomation and enhanced APIs for dynamic and proactive IT security management
Multimillion fine imposed on Replika for GDPR violations and data management issuesImplications for developers and integrators in complying with european privacy regulations
Innovations and advanced solutions for digital security at Cybsec-ExpoPiacenza takes center stage in cybersecurity with a focus on AI, automations, and professional networking
Pwn2Own Berlin 2025: the most surprising hacks and record prizes for advanced IT securityZero-day discoveries on critical systems, innovative exploits in AI and virtualization, and million-dollar rewards that mark a new era in cybersecurity for advanced IT professionals
Cyber attack prevention
AnyProxy proxy network taken down: new era for global SOCKS botnet securityLearn how international collaboration and artificial intelligence are revolutionizing the fight against SOCKS botnets and ensuring more effective security for corporate networks
European cybersecurity: proactive strategies and AI technologies to protect critical sectorsDiscover how API integration, AI automation and cross-industry collaboration can transform cybersecurity in Europe's critical industries into a manageable and proactive challenge
WordPress: Jetpack vulnerability discovered. Millions of users at riskLearn how the Jetpack plugin vulnerability puts WordPress sites at risk and what to do to protect them
Challenges and advanced solutions against sophisticated layer 7 DDoS attacksVerisign experiences addressing digital threats: analysis and strategies to protect against advanced cyber attacks at the most critical levels of the network
Serious vulnerability discovered in NVIDIA's container toolkitWhat you need to know about the NVIDIA container toolkit bug and how to protect yourself
Italy's success in cybersecurityHow Italy achieved excellence in global cybersecurity: strategies, collaborations, and international successes
Cyber incidents
Cybersecurity of electricity grids: how cyber attacks are putting energy at risk in EuropeHow cyberattacks threaten energy security in Europe: techniques, consequences and innovative strategies to defend electricity grids
Google Drive blocked: the challenges of Piracy Shield and the implications of accidental lockdownHow a simple technical error blocked Google Drive in Italy, highlighting the critical issues in a fight against piracy involving tech giants and national institutions
An unprecedented offensive: Cloudflare and the record-breaking DDoSLearn how Cloudflare thwarted the most powerful DDoS attack ever recorded and protect your networks from advanced cyber threats
IntelBroker alleged breach of Deloitte systemsServer exposed: how Deloitte's security may have been compromised by a cyber attack
Hacker attack in Lebanon: Hezbollah under fireTechnological shock and injuries: cyber warfare hits Hezbollah in Lebanon
Data breach: Fortinet faces new hack, 440GB of stolen informationFortinet under attack: hackers breach security and make information public. discover the details and the consequences for the privacy of involved users
Cyber threats
How to recognize and defend yourself from phishing attacks hidden in browser blob URIsDiscover how Blob URIs are revolutionizing phishing and which advanced solutions, including AI and automation, can protect corporate networks from invisible and sophisticated threats
DDoS: how defenses are changing against new threats to essential digital servicesAdvanced defense strategies, new attack techniques and devastating impacts on infrastructure: what IT managers need to know about DDoS in 2025
Learn how cybercriminals are challenging 2FA security in the digital ageNew 2FA vulnerabilities: how companies can defend against Mamba attacks and protect sensitive data from increasingly skilled cybercriminals
The dark trade of anonymous SIMs: a growing global threatThe global growth of the anonymous SIM trade: economic implications and challenges for international security
Vo1d infections on Android TV boxes: how to protect your devicesLearn the essential measures to protect your Android TV boxes from the dreaded Vo1d malware and keep your devices safe from cyber threats
Shocking cyber espionage discoveries: nation-state threatsHow state-of-state cyberwarfare is changing the game in the tech industry: Details and analysis of recent attacks
Cybersecurity events
Innovations and challenges of Cyber Security & Cloud Expo Europe 2024 in AmsterdamTrends and strategies that are redefining cybersecurity and cloud computing in 2024
Meet experts and innovations at the Cyber Security & Cloud Expo Europa 2024 in AmsterdamInnovative concepts and unique opportunities: discover the best of cybersecurity and cloud computing
The importance of the CyberDSA event for digital security in Southeast AsiaSoutheast Asia's leading cybersecurity event between international cooperation and technological innovation
Botswana Cyber Revolution Summit 2024 announcementGlobal experts gather to define the future of cybersecurity in the heart of Africa
Announcement of CYBSEC-EXPO, new cybersecurity fairMediapoint & Exhibitions inaugurates an event focused on the latest IT security solutions at an international level
Strategies and developments for the future of innovation in ItalyTowards a more innovative and safe Italy: advancement strategies and future challenges
Cybersecurity legislation
Serious GDPR violations: Cegedim Santè fined a million dollars, reveals flaws in health data privacyScandal in healthcare data management: how Cegedim Santè violated GDPR and put patients' privacy at risk
AI Act: new rules that will change the future of technologyNew rules for artificial intelligence: how the AI Act will change the technological and industrial landscape in Europe. Discover the challenges, opportunities and importance of international cooper...
Digital revolution in Switzerland: PA opens source code and promotes open sourceFind out how Switzerland is transforming digital transparency in public administration and reducing dependence on proprietary software
The 2009 Microsoft-EU agreement puts Windows security at risk: here's whyFind out how European regulations affect Windows cybersecurity and what the possible future scenarios are for Microsoft's operating system
Checkmate the criminal networks: the Interpol operation that reveals the invisibleFind out how Operation Interpol exposed digital fraudsters and traffickers through extraordinary global collaboration, seizing luxury goods and false documents
GDPR scandal: Vinted under investigation for serious user data breachesTransparency issues and misuse of data: Vinted in the crosshairs of European data protection authorities