Skip to Content
  • Sat. May 24th, 2025
  • NINAsec – Newsletter
  • inSicurezzaDigitale.com
  • Spcnet.it
  • Ziobudda
  • ilGlobale.it

Secure Bulletin

Navigating the cyber sea with knowledge

  • Databreach
  • Privacy
  • Hacktivism
  • Cybercrime
  • Vulnerability
  • Phishing
  • Malware
  • Ransomware
  • Spyware
  • AI
Top Tags
  • cybersecurity
  • malware
  • vulnerability
  • ransomware
  • cyber-attack
  • data breach
  • Phishing

Latest Post

3AM Ransomware: sophisticated social engineering and technical evasion in modern attacks Analysis of recent high-severity vulnerabilities in GitLab and Atlassian products Adidas customer data breaches in Turkey and Korea Dero miner container infection campaign Unmasking FrigidStealer: advanced macOS malware analysis and detection
Cybercrime

Alabama man sentenced to 14 months in SEC X account hack

17 May 2025
Cybercrime

China-Linked APTs exploit critical SAP NetWeaver vulnerability to breach over 580 systems globally

13 May 2025
Ransomware

3AM Ransomware: sophisticated social engineering and technical evasion in modern attacks

22 May 2025
Vulnerability

Analysis of recent high-severity vulnerabilities in GitLab and Atlassian products

22 May 2025
Databreach

Adidas customer data breaches in Turkey and Korea

21 May 2025
Malware

Dero miner container infection campaign

21 May 2025
Spyware

Unmasking FrigidStealer: advanced macOS malware analysis and detection

21 May 2025
  • Latest
  • Popular
  • Trending
3AM Ransomware: sophisticated social engineering and technical evasion in modern attacks
Ransomware
3AM Ransomware: sophisticated social engineering and technical evasion in modern attacks
Analysis of recent high-severity vulnerabilities in GitLab and Atlassian products
Vulnerability
Analysis of recent high-severity vulnerabilities in GitLab and Atlassian products
Adidas customer data breaches in Turkey and Korea
Databreach
Adidas customer data breaches in Turkey and Korea
Dero miner container infection campaign
Malware
Dero miner container infection campaign
End of Life for Linux Kernel 6.9: time to upgrade
Vulnerability
End of Life for Linux Kernel 6.9: time to upgrade
Critical Security Vulnerabilities in ownCloud File Sharing Software
Vulnerability
Critical Security Vulnerabilities in ownCloud File Sharing Software
3AM Ransomware: sophisticated social engineering and technical evasion in modern attacks
Ransomware
3AM Ransomware: sophisticated social engineering and technical evasion in modern attacks
Tracking the Development of SysJoker: A Cross-Platform Backdoor Used in Attacks Against Israel
Malware
Tracking the Development of SysJoker: A Cross-Platform Backdoor Used in Attacks Against Israel
3AM Ransomware: sophisticated social engineering and technical evasion in modern attacks
Ransomware
3AM Ransomware: sophisticated social engineering and technical evasion in modern attacks
Analysis of recent high-severity vulnerabilities in GitLab and Atlassian products
Vulnerability
Analysis of recent high-severity vulnerabilities in GitLab and Atlassian products
Adidas customer data breaches in Turkey and Korea
Databreach
Adidas customer data breaches in Turkey and Korea
Dero miner container infection campaign
Malware
Dero miner container infection campaign
Spyware

Katz Stealer: infostealers targets 78+ Chromium and Gecko-based browsers

15 May 2025

A newly uncovered information stealer, dubbed Katz Stealer, has rapidly emerged as a formidable threat to both enterprise and individual…

Malware

Trojanized KeePass campaign: novel loader and credential theft in ransomware operations

14 May 2025

A recent investigation by WithSecure’s Threat Intelligence team has uncovered a sophisticated malware campaign leveraging a trojanized version of the…

Cybercrime

China-Linked APTs exploit critical SAP NetWeaver vulnerability to breach over 580 systems globally

13 May 2025

In a significant escalation of cyber-espionage activities, multiple China-affiliated advanced persistent threat (APT) groups have been found actively exploiting a…

Ransomware

JPEG image FUD ransomware: a way to evades antivirus solutions

13 May 2025

In a concerning development for cybersecurity professionals, threat actors have begun leveraging a novel Fully UnDetectable (FUD) ransomware attack technique…

Spyware

New malware LOSTKEYS uncovered in COLDRIVER campaign targeting Western governments and NGOs

12 May 2025

The Google Threat Intelligence Group (GTIG) has recently uncovered a sophisticated new malware strain, dubbed LOSTKEYS, deployed by the Russian…

Cybercrime

German authorities shut down major crypto-swapping platform “eXch,” seizing €34 million in illicit assets

12 May 2025

On April 30, 2025, the Frankfurt am Main General Prosecutor’s Office-Central Unit for Combating Internet Crime (ZIT)-in close collaboration with…

Hacktivism

Tactical reality behind the India-Pakistan hacktivist surge

12 May 2025

In May 2025, a wave of hacktivist activity targeting Indian digital infrastructure sparked widespread alarm in media and social networks,…

Phishing

From PDF invoice to geo-fenced RAT delivery campaign

10 May 2025

A recent campaign targeting Southern European organizations demonstrates advanced evasion techniques combining social engineering, trusted platforms, and geolocation filtering. The…

Posts pagination

1 2 3 … 44

Our Network


Spcnet.it

  • Come mitigare l’esecuzione non autorizzata di PowerShell via Microsoft Word
    3 May 2025
  • Millennials e solitudine digitale: un equilibrio tra connessione e rischio
    7 April 2025
  • Gmail rivoluziona la sicurezza delle email: crittografia end-to-end per tutti
    2 April 2025
  • Rischi digitali per i Teenager: cosa possiamo imparare dalla serie “Adolescence”
    2 April 2025

inSicurezzaDigitale.com

  • Microsoft abbraccia il Passwordless: riflessioni
    18 May 2025
  • Cybercrime e AI: il nuovo volto della guerra digitale secondo Microsoft
    14 May 2025
  • Intanto in America: l’assalto dei bot ai Community College
    10 May 2025
  • Nitrogen Ransomware: una minaccia per il settore finanziario
    8 May 2025

ilGlobale.it - Political Notes

  • Viktoriia Roshchyna: cronaca e analisi politica di una morte annunciata
    1 May 2025
  • Riflessioni sull'Intelligenza Artificiale: un nuovo bivio politico e sociale
    30 March 2025
  • [Il bullo] non sta solo cercando di smantellare la democrazia americana. Ma anche quella di tutto il mondo
    9 March 2025
  • Sicurezza nazionale, il nuovo rapporto: le sfide dell'Italia nel 2025
    4 March 2025

NINAsec - Newsletter

  • Security Weekly 11-16/5/25
    17 May 2025
  • Security Weekly 28-2/5/25
    3 May 2025
  • Security Weekly 6-11/4/25
    12 April 2025
  • Security Weekly 31-4/4/25
    5 April 2025

You missed

Ransomware

3AM Ransomware: sophisticated social engineering and technical evasion in modern attacks

22 May 2025
Vulnerability

Analysis of recent high-severity vulnerabilities in GitLab and Atlassian products

22 May 2025
Databreach

Adidas customer data breaches in Turkey and Korea

21 May 2025
Malware

Dero miner container infection campaign

21 May 2025

Secure Bulletin

Navigating the cyber sea with knowledge

Proudly powered by WordPress | Theme: Newspaperex by Themeansar.

  • About Us
  • Contact Us
  • Privacy Policy