Articles

  • 4 days ago | hackmageddon.com | Paolo Passeri

    Last modified: June 4, 2025 Connect on Linkedin Follow me on X Follow me on Bluesky Connect on Mastodon In the second timeline of January 2025, I collected 107 events (7.13 events/day) with a threat landscape dominated by malware with 30%, up from 18% of the previous timeline, and very close to the values of December 2024, ahead of ransomware with 19% (it was 14% in the previous timeline) and account takeovers with 13% (it was 17% in the previous timeline), which swapped their positions. In...

  • 2 weeks ago | agendadigitale.eu | Paolo Passeri

    Lo sfruttamento da parte degli attaccanti di vulnerabilità inerenti le tecnologie tradizionali di accesso remoto come le VPN è stato un argomento ricorrente nel panorama della sicurezza informatica nel corso del 2024 (ed un trend che non sembra diminuire nel corso del 2025).

  • 3 weeks ago | infosecurity-magazine.com | Paolo Passeri

    The systematic abuse of legitimate cloud applications has become a constant in the cybercriminal ecosystem. Throughout 2024, attackers continuously adapted their tactics, techniques and procedures, relentlessly seeking new ways to bypass security defenses. This evolution reflects both their shifting strategies and the changing threat landscape – a trend expected to persist into 2025.

  • 1 month ago | hackmageddon.com | Paolo Passeri

    1 02/01/2025 Since October 2023 - ? Ethereum Developers Researchers at Socket discover several malicious packages on the npm registry impersonating the Nomic Foundation's Hardhat tool in order to steal sensitive data from developer systems. Malware Fintech Cyber Crime >1 Link Supply Chain Compromise 2 02/01/2025 02/01/2025 02/01/2025 ? NTT Docomo Japan’s largest mobile carrier, NTT Docomo, reports that it is working to restore services after a cyberattack temporarily disrupted operations.

  • 1 month ago | hackmageddon.com | Paolo Passeri

    Connect on LinkedinFollow me on X Follow me on BlueskyConnect on Mastodon I aggregated the statistics created from the cyber attacks timelines published in Q4 2024. In this period, I collected a total of 694 events (7.54 events/day) dominated by Cyber Crime with 70%, slightly up from 65.5% of Q3.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
5K
Tweets
6K
DMs Open
No
Paolo Passeri (@ppasseri@infosec.exchange)
Paolo Passeri (@[email protected]) @paulsparrows
2 Jun 25

#Threat actors continue to exploit legitimate #cloud apps. In this campaign discovered by the @Netskope Threat Labs, #phishing pages are hosted on Glitch, and Telegram is abused to exfiltrate credentials and bypass MFA. https://t.co/JHLM4lKzx3 #cloudsecurity

Paolo Passeri (@ppasseri@infosec.exchange)
Paolo Passeri (@[email protected]) @paulsparrows
28 May 25

The @Netskope Threat Labs for Europe 2025 🇪🇺 is out! 🌩️ #GitHub is the top #cloud app for #malware downloads (16%) 🌩️ Adobe is the most impersonated brand for #phishing (29%) 🌩️ 57% of #DLP violations concern regulated data 🌩️ 91% of orgs use #GenAI apps https://t.co/SrjzpJxLEy https://t.co/HSqqKtxotq

Paolo Passeri (@ppasseri@infosec.exchange)
Paolo Passeri (@[email protected]) @paulsparrows
16 May 25

One of the most surprising trends from the @Netskope Cloud and Threat Report 2025 is that #GitHub has surpassed Microsoft #OneDrive as the most exploited #cloud app for delivering #malware. I summarised the findings in a blog post for Infosec Magazine. https://t.co/08qWPsBpxe https://t.co/UjSSXAojV7