News

Newsroom

Stealer Malware Logs
Stealer Malware Logs
2024-04-05

In recent months, stealer logs have emerged as a new threat spreading across dark web. Through an exploration of parsed and unparsed logs, this article unveils the motivations driving their widespread sharing and provides practicable steps to protect yourself from becoming a victim.

Read more
CRIF Cyber Observatory - 2023 Yearly Report
2024-03-18

Cyber-attacks in 2023: 45% increase in data theft on the dark web. Over 7.5 billion pieces of information circulating on the dark web at a global level, with a 15.9% increase in reports. The techniques used by cybercriminals are becoming increasingly sophisticated: with the malicious use of artificial intelligence, it is getting harder and harder to distinguish between genuine and bogus communications.

Read more
Malvertising
Malvertising
2024-03-08

Advertising permeates every online interaction in our digital society. This ubiquitous presence has led to a new cyber threat, malvertising, which attempts to inject malicious code into digital ads, often distributed by legitimate advertising networks, making it more challenging to detect.

Read more
API Vulnerabilities
API Vulnerabilities
2024-02-23

APIs play a key role in our fast-paced digital landscape as they are incredibly useful to facilitate interactions between software communications. At the same time, they harbor many vulnerabilities that can compromise security. This article explores the most common ones and their potential consequences.

Read more
Internet of Things - Safe or Not?
Internet of Things - Safe or Not?
2024-01-26

In recent years IoT technology has considerably transformed our world, connecting everyday objects to the internet and enabling new possibilities. At the same time, this new era of connectivity has exposed us to new security risks, with cybercriminals constantly trying to take advantage of vulnerabilities.

Read more
Quishing – Phishing just got an upgrade
Quishing – Phishing just got an upgrade
2024-01-12

QR codes have become very popular in recent years and can be used for many purposes. Cybercriminals exploit them to lure users into sharing a variety of personal information such as credentials and financial data. As the number of quishing attacks continues to grow, it is important to know how to protect.

Read more
The 10 most famous hacking groups | White Blue Ocean
The 10 Most Notorious Hacking Groups in Recent History
2023-12-29

In the last years the world of cybercrime has been constantly developing, leading to a growing number of cyberattacks carried out by different hacking syndicates. This article provides a general overview of the 10 current prominent hacking groups, exploring their systems, motivations and tactics.

Read more
LockBit 3.0: the most prolific ransomware group in the world | White Blue Ocean
Who Are LockBit 3.0?
2023-12-15

At the moment LockBit 3.0 stands out as the world’s most successfully run ransomware group and have conducted over 850 attacks in 2023. Their unique way of operating has allowed them to collect $91m in ransom since 2020, with FBI monitoring showing limited impact so far.

Read more

Contacts

Let's talk

Please fill in the form below (fields with * are mandatory) and we will respond to your request as soon as possible!