Microsoft has activated on Tuesday the popups that will enroll users to Windows 10 Extended Security Updates.
blogs.windows.com/windowsexper…
Windows 11 is the home for AI on the PC, with even more experiences available today
AI is changing the way we use our PCs. According to a new consumer AI report commissioned by Microsoft, nearly 60% of people report using generative AI for work and business purposesWindows Experience Blog
reshared this
An ATM gang named FTP was dismantled and had members arrested this week
eurojust.europa.eu/news/action…
europol.europa.eu/media-press/…
diicot.ro/mass-media/5729-comu…
Action against ATM fraud in Romania and UK stopped by joint investigation team with Eurojust support
Authorities in Romania and the United Kingdom have taken concerted action to block criminals who illegally withdrew cash from automated teller machines (ATMs) on a large scale.Eurojust
reshared this
A crucial government cybersecurity contract has expired on Sunday.
The CyberSentry program monitored for malicious activity on the IT and OT networks of US critical infrastructure operators
cyberscoop.com/contract-lapse-…
Contract lapse leaves critical infrastructure cybersecurity sensor data unanalyzed at national lab
A program manager at Lawrence Livermore National Laboratory told lawmakers Tuesday that the recent contract expiration puts OT security at risk.Tim Starks (CyberScoop)
reshared this
Google has released OSS Rebuild, an open-source project that can add "reproducible builds" to any package repository system.
security.googleblog.com/2025/0…
Introducing OSS Rebuild: Open Source, Rebuilt to Last
Posted by Matthew Suozzo, Google Open Source Security Team (GOSST) Today we're excited to announce OSS Rebuild, a new project to strengthen ...Google Online Security Blog
reshared this
Someone hacked (maybe a malicious insider) Toptal's GitHub repo and published packages that stole GitHub auth tokens and destroyed systems
Zoinks!!!
reshared this
I block .site so I was unaware of this webhook pastebin
With Webhook[.]site, you instantly get a unique, random URL that you can use to test and debug Webhooks and HTTP requests
Hard no.
Several Russian regions have set up public free WiFi zones in recent weeks.
The move comes to keep citizens connected online as the regions have had to shut down mobile networks in an attempt to prevent Ukrainian drones from using mobile signals to find their targets.
reshared this
The FBI has published an alert about The Com, the underground community from which Lapsus and Scattered Spider originated. The alert warns of The Com's involvement in swatting, violent crime, social engineering training, and hacking activities. It's designed to warn parents about the dangers such communities pose to youth online.
reshared this
"Of the new ransomware families observed, the proportion specifically tailored for vSphere ESXi systems grew from ~2% in 2022 to over 10% in 2024."
cloud.google.com/blog/topics/t…
Beyond Convenience: Exposing the Risks of VMware vSphere Active Directory Integration
We explore the critical risks of integrating VMware vSphere with Active Directory, especially as it relates to ransomware.Mandiant (Google Cloud)
reshared this
Looks like Ukraine arrested the XSS hacking forum admin
[One source for now]
reshared this
Europol press release is out now too
europol.europa.eu/media-press/…
Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine – Suspected forum administrator with nearly 20 years in cybercrime made over EUR 7 million facilitating illegal activities | Europol
Suspected forum administrator with nearly 20 years in cybercrime made over EUR 7 million facilitating illegal activities.Europol
CISA adds the original ShellTool bugs (CVE-2025-49704 and CVE-2025-49706) to the KEV catalog
reshared this
Proofpoint looks at the rising trend of Request for Quote scams. These target businesses. Scammers ask for a quote for expensive products, then use 15-90 days net financing options to receive the goods via a loan, but never pay. Sometimes they also use these email exchanges to deliver malware.
proofpoint.com/us/blog/threat-…
NET RFQ: Request for Quote Scammers Casting Wide Net to Steal Real Goods | Proofpoint US
Key findings Request for Quote scammers are using vendor supplied financing to steal physical goods. They utilize email and legitimate online quote request forms to reachProofpoint
reshared this
Stuxnet hearing stream:
youtube.com/watch?v=jLROmU7j57…
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
reshared this
Three APTs are behind the recent SharePoint zero-day attacks:
-Linen Typhoon
-Violet Typhoon
-Storm-2603
microsoft.com/en-us/security/b…
Disrupting active exploitation of on-premises SharePoint vulnerabilities | Microsoft Security Blog
Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting vulnerabilities targeting internet-facing SharePoint servers.Microsoft Threat Intelligence (Microsoft Security Blog)
reshared this
This is by far the coolest part in the UK's proposed ransomware ban and mandatory reporting proposal
gov.uk/government/news/uk-to-l…
UK to lead crackdown on cyber criminals with ransomware measures
Measures to tackle the threat of ransomware and protect businesses and critical services will be taken forward with industry following public consultation.Home Office (GOV.UK)
reshared this
Security camera maker Ring says the recent mysterious logins that users spotted on their accounts were due to a backend error and not a security breach or intrusions.
status.ring.com/incidents/ns6d…
Incorrect Login Dates & Client Device Information
Ring.com's Status Page - Incorrect Login Dates & Client Device Information.status.ring.com
reshared this
Security firm Trail of Bits has released Vendetect, a tool for automatically detecting copy/pasted code between repositories.
blog.trailofbits.com/2025/07/2…
github.com/trailofbits/vendete…
Detecting code copying at scale with Vendetect
Vendetect is our new open-source tool for detecting copied and vendored code between repositories. It uses semantic fingerprinting to identify similar code even when variable names change or comments disappear.Evan Sultanik (The Trail of Bits Blog)
reshared this
Trustwave looks at four threat actors selling access to hacked flight and hotel reservation systems.
These types of services are often referred to as "dark web travel agencies."
trustwave.com/en-us/resources/…
No Tell Motel: Trustwave Exposes the Secrets of Dark Web Travel Agencies
Dark web travel agencies have emerged as one of the more sophisticated and lucrative operations within the underground economy.Nikita Kazymirskyi (Trustwave Holdings, Inc.)
reshared this
A threat actor known as Mimo or Mimo'lette has recently updated its operations and has switched from targeting Craft CMS sites to going after Magento online stores.
The attacker's main goals still remain proxyjacking and cryptomining.
securitylabs.datadoghq.com/art…
Beyond Mimo’lette: Tracking Mimo's Expansion to Magento CMS and Docker | Datadog Security Labs
This post reports on activity from the 'Mimo' threat actor.securitylabs.datadoghq.com
reshared this
While cyber insurance is common in the West thanks to Russian cybercriminals, Russian insurance companies are now also adding it to their offerings following a rise in destructive attacks from Ukrainian hackers
Допуслуги пополнились атаками
Российская национальная перестраховочная компания (РНПК) приняла решение добавить риски поломки оборудования и перерыва в производстве в результате киберинцидентов в перестраховании имущества.Юлия Пославская (Газета «Коммерсантъ»)
reshared this
The Dutch Public Prosecutor says it expects to have its internal network disconnected from the internet for weeks as it deals with a recent security breach caused by an improperly applied CitrixBleed2 patch
om.nl/actueel/nieuws/2025/07/2…
Werk OM mogelijk komende weken nog verstoord
Het Openbaar Ministerie blijft mogelijk nog weken afgesloten van het internet. Vanuit het College van procureurs-generaal is dit maandagochtend bekend gemaakt aan alle medewerkers.www.om.nl
reshared this
Talks from the SLEUTHCON 2025 security conference, which took place in June, are now available on YouTube
reshared this
With China's ginormous investments in Africa, it was only natural that the APTs would follow
securelist.com/apt41-in-africa…
Rumble in the jungle: APT41’s new target in Africa
Kaspersky experts analyze an incident that saw APT41 launch a targeted attack on government IT services in Africa.Denis Kulik (Kaspersky)
reshared this
-SMS blasting incidents are rising
-Iranian security firm behind APT39
-Chinese hackers breach Singapore critical infra
-new SharePoint and CrushFTP zero-days
-Japan releases free decrypters for Phobos and 8base ransomware
-Ukrainian GUR claims Gazprom hack
-Russian alcohol retailer closes stores after hack
-CoinDCX hacked for $44mil
-Dutch Public Prosecutor goes offline after possible hack
Newsletter: news.risky.biz/risky-bulletin-…
Podcast: risky.biz/RBNEWS454/
Risky Bulletin: SMS blasting incidents are rising
In other news: Chinese hackers breach Singapore critical infrastructure; new SharePoint and CrushFTP zero-days; Japan releases free decrypters for Phobos and 8base ransomware.Catalin Cimpanu (Risky.Biz)
reshared this
-Microsoft removes escorts program from DOD cloud
-Russia tells WhatsApp to leave
-Telegram is working on an age verification system
-UK sanctions Russian (cyber)spies
-ATM jackpotters arrested in Michigan
-Russia arrests seven leakers from govt systems
-npm supply chain attack
-Malicious AUR packages impact Linux Arch users
-Greedy Sponge group targets Mexico
-Reports on NailaoLocker, Ghost Crypt, MDifyLoader, SquidLoader, and DeedRAT
Catalin Cimpanu reshared this.
-Matryoshka goes after Moldova
-Upcoming Matrix security patch scheduled for Aug 11
-curl considers ending bug bounty program
-Proposal to freeze old cryptocurrency before quantum attacks
An Iranian security firm is behind a years-long hacking campaign that targeted airlines all over the world.
Security firm Amnban is allegedly one of the contractors behind an Iranian hacking group known as APT39.
Its operations came to light after a leak of internal documents: blog.narimangharib.com/posts/2…
reshared this
At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage
Wired piece: wired.com/story/at-least-750-u…
reshared this
Brazilian security firm Tempest Security has found four vulnerabilities in Intelbras routers. All issues have now been fixed
reshared this
The team behind the Matrix IM servers has announced an important security update that will be released on August 11
matrix.org/blog/2025/07/securi…
Pre-disclosure: Upcoming coordinated security fix for all Matrix server implementations
Matrix, the open protocol for secure decentralised communicationsMatthew Hodgson (matrix.org)
reshared this
There's a new Microsoft SharePoint zero-day getting exploited right now: CVE-2025-53770
msrc.microsoft.com/blog/2025/0…
Customer guidance for SharePoint vulnerability CVE-2025-53770 | MSRC Blog | Microsoft Security Response Center
Customer guidance for SharePoint vulnerability CVE-2025-53770msrc.microsoft.com
reshared this
@sassdawe Every time I read about a new vulnerability in SharePoint, I remember your toot about people using Confluence because a SharePoint marketer failed to do their job properly...
Catalin Cimpanu reshared this.
Singapore says a Chinese APT tracked as UNC3886 has breached part of its critical infrastructure
reshared this
Security researcher Hamid Kashfi has put together a Google spreadsheet with cyber-related activity related to the recent skirmish between Iran and Israel
reshared this
The Arch Linux team has removed three malicious packages from the AUR package repository.
The packages posed as browser modifications but downloaded and installed a RAT from GitHub.
reshared this
When I ran Arch Linux, I never used the AUR, out of worry that I might download something like one of these.
There's an ongoing npm supply chain attack taking place:
reshared this
-New phishing technique bypasses FIDO keys
-Surveillance vendor deploys new SS7 exploit
-South Korea's largest insurance provider gets ransomed
-Europol take down NoName057 servers
-Australia to create a cyber reserves force
-Australian right-wing party gets ransomed
-Qantas gets injunction for hacked data
-UK MoD leak exposed spies and special forces
-Seychelles Commercial Bank confirms hack
-Air Serbia hacked
Podcast: risky.biz/RBNEWS453/
Newsletter: news.risky.biz/risky-bulletin-…
Risky Bulletin: New phishing technique bypasses FIDO keys
In other news: Surveillance vendor deploys new SS7 exploit; South Korea's largest insurance provider gets ransomed; law enforcement agencies take down NoName057 servers.Catalin Cimpanu (Risky.Biz)
reshared this
-EU stalls Twitter investigation
-Exchange gets 6 months of ESUs
-Roblox to test face age estimation tech
-Steam bans thousands of games for adult content
-US House to hold hearing on Stuxnet
-EU imposes new sanctions on Russia's propaganda machine
-FCC to ban Chinese gear in submarine cables
-Russia to fine improper web searches
-Ryuk member extradited to US
-Scattered Spider members released on bail
-Cambodia detains 1k scammers
-Thai raids scam centers
Catalin Cimpanu reshared this.
-Google sues BADBOX botnet
-Abacus Market exit scams
-New Massistant phone forensics tool used in China
-New Fortinet shells in the wild
-LARVA-208 switches to Web3 devs
-New Maison Receipts service
-New protestware spreads on npm
-In-browser cryptojacking is still alive
-PQC support in SSH servers is only 6%
-Crypto-thefts this year reach $2.17b
-New Matanbuchus 3.0
-Russia runs extensive info-ops in the occupied territories
Cyberattack at Tennessee’s CRMC
Cookeville Regional Medical Center in Cookeville, Tennessee, reported a network security breach on Sunday involving unauthorized access to its computer systems.Dysruption Hub (The Dysruption Hub)
Rrawrrrwoooo: Grrrraarrh Rrraaaawwwgghh of 'Star Woooors' Cwwwoouulllttuurree
Grrrraaaarr, raawrrr rwrrr kung-grra, lightsaber, aarrgh grarrr raaaar, raaawww graahh, reawwarrgz, roooowwwrr rrrrwa, gaaaahrrr ggrrwwaa raaaaw rwwwwhrrr krrrghh, raawrr raaawwwrrr grawggggh wrrghh rwwa shrrruu graaarrwrr, wrrrrh gghh-ghrrrgh rwwwwwg raaaarrrw.
Rapporto sul mercato del lavoro in Italia 2025 a cura di GigExchange
Sintesi:
Il Rapporto sul Mercato del Lavoro in Italia 2025 offre un'analisi approfondita del mercato del lavoro nazionale, evidenziando tendenze, sfide e opportunità chiave. Nel 2025, il mercato del lavoro italiano è caratterizzato da una solida ripresa economica, trainata dai progressi tecnologici, dall'aumento degli investimenti esteri e da politiche governative strategiche. Nonostante questi sviluppi positivi, persistono sfide come le disparità regionali, la disoccupazione giovanile e lo squilibrio tra domanda e offerta di competenze. Questo rapporto offre una panoramica completa delle condizioni economiche, della demografia della forza lavoro, delle tendenze occupazionali, dei tassi di disoccupazione, delle offerte di lavoro, dei salari, dell'istruzione e dei dati specifici per settore. Fornisce inoltre raccomandazioni strategiche per decisori politici, educatori e datori di lavoro per migliorare la competitività e l'inclusività del mercato del lavoro italiano.
-
Premessa
Il Rapporto sul Mercato del Lavoro in Italia 2025 si propone di fornire un'analisi dettagliata dello stato attuale del mercato del lavoro in Italia. Mentre il Paese emerge dalle sfide economiche dell'ultimo decennio, sta vivendo un periodo di trasformazione e crescita. Questo rapporto analizza diversi aspetti del mercato del lavoro, tra cui le condizioni economiche, le dinamiche della forza lavoro, i trend occupazionali e gli sviluppi specifici del settore. L'analisi copre il periodo fino al 2025 e offre approfondimenti sui fattori che plasmano il mercato del lavoro, come i progressi tecnologici, la globalizzazione e i cambiamenti demografici. Il rapporto rappresenta una preziosa risorsa per decisori politici, educatori, datori di lavoro e persone in cerca di lavoro, fornendo spunti basati sui dati e raccomandazioni strategiche per promuovere un mercato del lavoro fiorente e inclusivo in Italia.
Qui il report completo: gigexchange.com/job-market/job…
Lavoratori Tech reshared this.
Il blog #ilfediversofaschifo è tornato on line, ma mi sono posto una domanda: la tua istanza è silenziata dal mio provider?
[AGGIORNAMENTO: sembra che ci sia un problema con TUTTE le istanze Friendica; nessun problema con la maggior parte delle istanze italiane e internazionali. Ho ricevuto un post da @pirati e non mi è andato in spam]
Rieccomi qui, dopo essere stato temporaneamente sospeso probabilmente a causa di un post in cui ricorrevano diverse buzzword che in questo periodo è meglio usare con parsimonia.
Ho notato infatti che il post di @gubi quello di @enzoesco e quello di @blogverso erano finiti nello spam (capito @informapirata?).
Non mi è successo con i post di mastodon.uno, infosec.exchange e mastodon.social
A questo punto chiedo se c’è qualcuno che vuole provare a rispondere a questo post, tanto per provare!Qualcuno può rispondere a questo post?
#GubitosaPiuBelloDiCaparezza
like this
reshared this
VessOnSecurity
in reply to Catalin Cimpanu • • •