Italian CIOs at the crossroads of transformation and sustainability
Data is needed, for example, to cluster buildings based on their specificities, and decide how to reallocate them. Smart buildings,...
Data is needed, for example, to cluster buildings based on their specificities, and decide how to reallocate them. Smart buildings,...
Apr 18, 2024NewsroomMalvertising / Endpoint Security A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate...
Apr 02, 2024NewsroomCyber Espionage / Threat Intelligence A threat activity cluster tracked as Earth Freybug has been observed using a...
Mar 22, 2024NewsroomCyber Defense / Vulnerability A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software...
Aug 22, 2023THNSoftware Supply Chain / Malware A previously undocumented threat cluster has been linked to a software supply chain...