Archive for Cybersecurity - page 31

Phishing vs Spear Phishing

Vediamo quali sono le principali differenze! Il phishing è fondamentalmente una versione online della pesca, solo che al posto della fauna marina, l’obiettivo è quello di attirare gli utenti creduloni a rivelare password e informazioni personali facendo clic su un link dannoso o aprendo un…

Continue reading →

Fraud as a Service (FaaS)

La frode è diventata un business e facilmente accessibile. I criminali informatici ora vendono i loro strumenti e servizi a chiunque sia disposto a pagare. Il Fraud as a Service (FaaS) trasforma attacchi informatici complessi, eseguiti da hacker professionisti, in operazioni semplici e chiavi in…

Continue reading →

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-49035 Microsoft Partner Center Improper Access Control Vulnerability CVE-2023-34192 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability Users and administrators are also encouraged to review the Palo Alto Threat…

Continue reading →

Secure By Design: A Continued Priority in 2025 and Beyond

Learn how Fortinet works closely with public and private sector organizations—from government to academia to end users—who all play a critical role in protecting our collective digital infrastructure. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-23209 Craft CMS Code Injection Vulnerability CVE-2025-0111 Palo Alto Networks PAN-OS File Read Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks…

Continue reading →

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24989 Microsoft Power Pages Improper Access Control Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise….

Continue reading →

Fortinet Executive Q&A: Driving Growth, Innovation, and Market Leadership in Cybersecurity

Learn insights from Fortinet’s executive leadership on the company’s performance, strategic growth initiatives, and future plans. Read more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Quantum-Safe Encryption: Safeguarding Data for the Quantum Era

Learn how quantum computers threaten current encryption standards and methods to protect your data. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Page 31 of 169 ← First ... 29 30 31 32 33 ... Last →