-
Home
-
News
-
Ansa.it (italian)
- Homepage
- Cronaca
- Mondo
- Economia
- Sport
- Cinema
- Tecnologia
- Ultima ora
- English news
- Foto
- Video
- Abruzzo
- Basilicata
- Calabria
- Campania
- Emilia Romagna
- Friuli Venezia Giulia
- Lazio
- Lombardia
- Marche
- Molise
- Piemonte
- Puglia
- Sardegna
- Sicilia
- Toscana
- Tretino Alto Adige \ Sudtirol
- Umbria
- Valle d' Aosta
- Veneto
- Ambiente ed Energia
- Motori
- Terra & Gusto
- Salute e Benessere
- Scienza e Tecnica
- Europa
- Nuova Europa (IT)
- Nuova Europa (EN)
- Viaggiart
- CNN
- Various
-
Ansa.it (italian)
-
Software Development
-
Dzone
- AI\ML Zone
- Agile Zone
- All contents
- Big Data Zone
- Career Development Zone
- Cloud Architecture Zone
- Containers
- Data Zone
- Database Zone
- Deployment Zone
- DevOps and CI/CD
- Dzone Home
- Frameworks
- Integration
- IoT
- Java
- Javascript
- Languages
- Maintenance
- Methodologies
- Microservices
- Monitoring and Observability
- Open Source
- Performance
- Publications
- Security zone
- Team management
- Testing, Tools, and Frameworks Zone
- Tools
- Web Dev
- Frontend Development
- Java
- PHP
- Python
- Sofware Engineers
-
Dzone
-
AI
-
Cyber Security
- Threat Post
-
Websites
- Cisco Blog
- Cisco Security
- Cybersecurity 360
- Daniel Miessler
- Dark reading
- Darknet.org
- EC Council
- GBHackers On Security
- Google Online Security Blog
- Graham Cluley - Cybersecurity and AI keynote speaker
- Guardian computer security
- HackRead
- Hacker Combat
- Help Net Security
- IT Governance Blog
- IT Security Central
- ImmuniWeb - Cybercrime Investigations Weekly
- Kali Linux
- Krebs on Security
- Naked Security
- Schneier on Security
- Search Security
- Securelist.com
- Security Affairs
- Security Gladiators
- Security Week
- Seqrite Blog
- TRUSTe Blog
- The Hacker News
- Threat Insight Blog
- Trend Micro
- Zero Day | ZDNet
-
Gaming
Securelist
Threat landscape for industrial automation systems in Q3 2025
The report contains statistics on various threats detected and blocked on ICS computers in Q3 2025, including miners, ransomware, spyware, etc.
Posted on 25 December 2025 | 10:00 am
Evasive Panda APT poisons DNS requests to deliver MgBot
Kaspersky GReAT experts analyze the Evasive Panda APT's infection chain, including shellcode encrypted with DPAPI and RC5, as well as the MgBot imp...
Posted on 24 December 2025 | 7:00 am
Assessing SIEM effectiveness
We share the results of assessing the effectiveness of Kaspersky SIEM in real-world infrastructures and explore common challenges and solutions to ...
Posted on 23 December 2025 | 12:00 pm
From cheats to exploits: Webrat spreading via GitHub
We dissect the new Webrat campaign where the Trojan spreads via GitHub repositories, masquerading as critical vulnerability exploits to target cybe...
Posted on 23 December 2025 | 8:00 am
Cloud Atlas activity in the first half of 2025: what changed
Kaspersky expert describes new malicious tools employed by the Cloud Atlas APT, including implants of their signature backdoors VBShower, VBCloud, ...
Posted on 19 December 2025 | 10:00 am
Yet another DCOM object for lateral movement
Kaspersky expert describes how DCOM interfaces can be abused to load malicious DLLs into memory using the Windows Registry and Control Panel.
Posted on 19 December 2025 | 8:00 am
Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports
Kaspersky's GReAT experts have uncovered a new wave of cyberattacks by the ForumTroll APT group, targeting Russian political scientists and deliver...
Posted on 17 December 2025 | 10:00 am
God Mode On: how we attacked a vehicle’s head unit modem
Kaspersky researchers describe how they gained access to a vehicle's head unit by exploiting a single vulnerability in its modem.
Posted on 16 December 2025 | 10:00 am
Frogblight threatens you with a court case: a new Android banker targets Turkish users
Kaspersky researchers have discovered a new Android banking Trojan targeting Turkish users and posing as an app for accessing court case files via ...
Posted on 15 December 2025 | 7:00 am
Following the digital trail: what happens to data stolen in a phishing attack
Kaspersky experts detail the journey of the victims' data after a phishing attack. We break down the use of email-based phishing kits, Telegram bot...
Posted on 12 December 2025 | 10:00 am