Russian state hackers targeted Western critical infrastructure for years, Amazon says
Russian state hackers targeted Western critical infrastructure for years, Amazon says Pierluigi Paganini December 17, 2025 Amazon disclosed a years-long...
Russian state hackers targeted Western critical infrastructure for years, Amazon says Pierluigi Paganini December 17, 2025 Amazon disclosed a years-long...
As Artificial Intelligence technology rapidly advances, Large Language Models (LLMs) are being widely adopted across countless domains. However, with this...
Dec 16, 2025Ravie LakshmananCloud Security / Vulnerability Amazon's threat intelligence team has disclosed details of a "years-long" Russian state-sponsored campaign...
French Interior Minister says hackers breached its email servers Pierluigi Paganini December 16, 2025 The French interior minister confirmed that...
AWS: China-linked threat actors weaponized React2Shell hours after disclosure Pierluigi Paganini December 08, 2025 Multiple China-linked threat actors began exploiting...
BRICKSTORM backdoor exposed: CISA warns of advanced China-backed intrusions Pierluigi Paganini December 05, 2025 CISA details BRICKSTORM, a China-linked backdoor...
Artificial intelligence isn’t just another tool in the security stack anymore – it’s changing how software is written, how vulnerabilities...
For the first time, a RomCom payload has been observed being distributed via SocGholish Pierluigi Paganini November 26, 2025 RomCom...
AI and Geopolitics: How AI Reshapes Conflict Influence Artificial Intelligence isn’t just transforming industries; it’s fundamentally reshaping the global geopolitical...
CISA: Spyware and RATs used to target WhatsApp and Signal Users Pierluigi Paganini November 25, 2025 CISA warns that threat...
New research from CrowdStrike has revealed that DeepSeek's artificial intelligence (AI) reasoning model DeepSeek-R1 produces more security vulnerabilities in response...
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks Pierluigi Paganini November 22, 2025 APT24 used supply chain...
Nov 21, 2025 – Lina Romero – In 2025, Artificial Intelligence is everywhere, and so are AI vulnerabilities. In...
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to...
North Korean threat actors use JSON sites to deliver malware via trojanized code Pierluigi Paganini November 17, 2025 North Korean...