Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware
The zero-day exploitation of a now-patched security flaw in Google Chrome led to the distribution of an espionage-related tool from...
The zero-day exploitation of a now-patched security flaw in Google Chrome led to the distribution of an espionage-related tool from...
Image: Envato Sixty-five countries have signed the first-ever United Nations treaty aimed at fighting cybercrime, even as rights groups and...
Your security team is drowning. Critical positions sit vacant for months, existing staff burnout covering multiple roles, and every...
Memento Labs, the ghost of Hacking Team, has returned — or maybe it was never gone at all. Pierluigi Paganini...
How Do Non-Human Identities Transform Security for Organizations? Where increasingly driven by technology, how do organizations ensure the safety...
Crafted URLs can trick OpenAI Atlas into running dangerous commands Pierluigi Paganini October 27, 2025 Attackers can trick OpenAI Atlas...
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security...
In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption,...
How Can Organizations Achieve Scalable Security in Cloud Environments? The increasing reliance on cloud environments means organizations face an...
Security Affairs newsletter Round 547 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini October 26, 2025 A new round of...
How Effective Is Your Non-Human Identity Management? Are your data security strategies truly effective in safeguarding machine identities within...
Russian Rosselkhoznadzor hit by DDoS attack, food shipments across Russia delayed Pierluigi Paganini October 25, 2025 A DDoS attack on...
CVE-2025-59287: Microsoft fixes critical WSUS flaw under active attack Pierluigi Paganini October 25, 2025 Microsoft released urgent updates to address...
How Can Organizations Ensure Assured Security with Enhanced Non-Human Identities? Maintaining assured security requires more than just safeguarding human...
U.S. CISA adds Microsoft WSUS, and Adobe Commerce and Magento Open Source flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini...