Articoli Sicurezza informatica Tecnologia

Gli hacker hanno abusato delle app Microsoft OAuth per violare gli account e-mail aziendali

Martedì, Microsoft ha annunciato di aver preso provvedimenti per disabilitare gli account fasulli di Microsoft Partner Network (MPN) che erano stati utilizzati per creare applicazioni OAuth dannose come parte di una campagna di phishing intesa a infiltrarsi negli ambienti cloud delle aziende e rubare la posta elettronica. La società informatica ha affermato che gli attori fraudolenti "hanno creato applicazioni che sono state successivamente […]

Per saperne di più
Articoli Sicurezza informatica Tecnologia

La British Cyber Agency mette in guardia contro gli hacker russi e iraniani che prendono di mira le industrie chiave

Giovedì, il National Cyber Security Centre (NCSC) del Regno Unito ha emesso un avviso sugli attacchi di spear phishing effettuati da attori sponsorizzati dallo stato in Iran e Russia. SEABORGIUM (noto anche come Callisto, COLDRIVER e TA446) e APT42 sono stati accusati dall'agenzia per le intrusioni (alias ITG18, TA453 e Yellow Garuda). Nonostante i parallelismi nei modi in cui […]

Per saperne di più
Articoli Sicurezza informatica Tecnologia

Oltre 4.500 siti Worldpress violati per reindirizzare i visitatori a pagine pubblicitarie imprecise

Una massiccia campagna ha infettato più di 4.500 siti Web WordPress come parte di un'operazione in corso che si ritiene sia attiva dal 2017. Secondo il proprietario di Godadddy, Sucuri le infezioni comportano l'iniezione di un JavaScript ospitato su un dominio denominato "track[.] violetlovelines[.]com progettato per reindirizzare i visitatori verso alcuni siti indesiderati. L'ultimo […]

Per saperne di più
Articoli Sicurezza informatica Tecnologia

Gli hacker cinesi utilizzano il malware Golang negli attacchi Dragon Spark

Organizations in East Asia are targeted by likely Chinese-speaking actor dubbed DragonSpark while employing uncommon tactics to go past security layers. Chinese hackers utilize malware and attacks are characterized by use of open source SparkRAT and malware which attempts to evade detection through a Golang source code interpretation. A striking aspect of the intrusions is […]

Per saperne di più
Articoli Sicurezza informatica Tecnologia

Emotet Malware Makes a Comeback with New Evasion Technique

The Emotet malware operation has continued to refine its tactics in a effort to fly under the radar while acting as a conduit for other dangerous malware such as Bumblebee and IcedID. Emotet which is officially reemerged in late 2021 after which a coordinated takedown of its infrastructure by authorities earlier that year which has […]

Per saperne di più
Articoli Sicurezza informatica Tecnologia

Apple issues Update for older Devices

Apple has fixes for a recently disclosed critical security flaw that is affecting older devices which is reciting evidence of active exploitation. The issue which is tracked as CVE-2022-42856 and is a type confusion vulnerability in the WebKit browser engine that could result in arbitrary code execution when processing maliciously crafted web content. While it […]

Per saperne di più
Articoli Sicurezza informatica Tecnologia

Samsung Galaxy Store App Vulnerable to Sneaky App Install

Two security flaws has disclosed in Samsung’s Galaxy Store app for Android that are exploited by a local attacker to install arbitrary apps to fraudulent landing pages on the web. The issues that tracked as CVE-2023-21433 and CVE-2023-21434, were discovered by NCC Group which is notified to the South Korean chaebol in November and December […]

Per saperne di più
Sicurezza informatica Tecnologia

Chinese Hackers Exploited Recent Fortinet Flaw

Suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day in attacks which are targeting a European government entity and a managed service provider (MSP)that is located in Africa. Telemetry evidence gathered by Google-owned Mandiant indicates that the exploitation is occurred as early as October 2022which is at least […]

Per saperne di più
Articoli Tecnologia

The Most Awaited ChatGPT API by OpenAI set to Release Soon – A Game Changer in AI-Powered Language Generation

OpenAI, the leading AI research organization, is soon set to release the much-awaited ChatGPT API. This powerful language model is trained on a massive dataset of internet text and can generate natural-sounding text in a variety of styles and formats. With the ability to understand context, ChatGPT can generate text that is relevant to a given topic or conversation. The release of the API will make it easy for developers and businesses to integrate the model into their own systems and applications, unlocking the potential for a range of applications such as chatbots, automated customer service, and content creation. Get ready to experience the advancements in AI-powered language generation with OpenAI’s ChatGPT API.

Per saperne di più
Articoli Tecnologia

Manufacturing Workflow in ERPNEXT

Manufacturing workflow in ERPNEXT involve series of things which are important for manufacturing a product. It involves creating new item,then add details of customer , supplier of rawmaterials,creating bills of material ,production plan,sales and order and purchase order for item and then add rate for delivery so that manufacturing product can be ready for delivering […]

Per saperne di più