Rebus' Digest

  • Home
  • Rebus' Digest

Rebus' Digest Rebus' Digest è la newsletter a cadenza giornaliera relativa alla rassegna web curata più o meno quotidianamente dal Rebus.

Rebus' Digest raccoglie le notizie più interessanti e utili in materia di digital forensics, informatica giuridica, diritti digitali, cybercrime, investigazione e intelligence, hacking e sicurezza informatica che compaiono in oltre 270 fonti italiane e internazionali scelte tra testate giornalistiche, riviste on-line, blog e altri siti dedicati a queste materie. La rassegna viene condivisa in temp

o reale tramite feed RSS; in alternativa, ogni mattina alle 10:00 viene generata una newsletter con le notizie delle ultime 24h, che è possibile ricevere via e-mail iscrivendosi al servizio.

Perché gli Infostealers sono una minaccia sempre più attuale. Cosa sono e come difenfersi - via CyberSecurity Italia
15/01/2025

Perché gli Infostealers sono una minaccia sempre più attuale. Cosa sono e come difenfersi - via CyberSecurity Italia

Proteggersi dagli infostealer richiede un approccio integrato che combina misure preventive e reattive, essenziali per ridurre il rischio

Il governo britannico vuole vietare il pagamento del riscatto per gli attacchi ransomware - via Wired Italia
15/01/2025

Il governo britannico vuole vietare il pagamento del riscatto per gli attacchi ransomware - via Wired Italia

Il ministro dell'Interno avanza una proposta di legge per limitare la crescente attività delle cybergang

Thunderbolt ports aren’t all the same - via Macs – The Eclectic Light Company
15/01/2025

Thunderbolt ports aren’t all the same - via Macs – The Eclectic Light Company

Some support USB4, others don’t. Some share the controller, others don’t. Some support DFU mode but then can’t be used to create a bootable external disk on Apple silicon.

FBI forces Chinese malware to delete itself from thousands of US computers - via Ars Technica
15/01/2025

FBI forces Chinese malware to delete itself from thousands of US computers - via Ars Technica

Self-delete commands sent from commandeered server to malware on infected PCs.

Jump List Forensics 2025 - via Cyber Triage
15/01/2025

Jump List Forensics 2025 - via Cyber Triage

How to explain jump lists forensics to an old-school detective: Jump lists are fingerprints. They connect people to places and things. Jump lists

Barcellona è diventata un hub mondiale per le aziende di spyware - via Wired Italia
15/01/2025

Barcellona è diventata un hub mondiale per le aziende di spyware - via Wired Italia

Le aziende di cybersecurity israeliane si trasferiscono in massa nella città catalana

Analyzing iOS Kernel Panic Logs - via 8kSec - 8kSec is a cybersecurity research & training company. We provide high-qual...
15/01/2025

Analyzing iOS Kernel Panic Logs - via 8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.

What is a Kernel Panic ? In this blog, we will be talking about analyzing iOS Kernel panic logs. A kernel panic occurs when the operating system kernel encounters a fatal error. This error is so severe that the kernel cannot continue operating or safely recover the system to a stable state. By defau...

FileVault and volume encryption explained - via Macs – The Eclectic Light Company
14/01/2025

FileVault and volume encryption explained - via Macs – The Eclectic Light Company

How FileVault and APFS Encrypted are enabled and managed differently, and details of how they work internally. Concentrates on T2 and Apple silicon Macs, but also covers older Intel models.

Windows Browser Forensics 101 - via Belkasoft site
14/01/2025

Windows Browser Forensics 101 - via Belkasoft site

An overview of Windows browser forensics focusing on data extraction, artifact locations, and analysis techniques with Belkasoft X.

Windows Recycle Bin - The known and the unknown - via Be-binary 4n6
14/01/2025

Windows Recycle Bin - The known and the unknown - via Be-binary 4n6

This is my blog about topics in the field of digital forensics.

iPhone and iPad Acquisition Methods: Yet Another Comparison - via Advanced Password Cracking
14/01/2025

iPhone and iPad Acquisition Methods: Yet Another Comparison - via Advanced Password Cracking

Welcome to the world of mobile forensics, where extracting data is the first (and arguably the most critical) step. Whether you're working with an ancient Apple device or attempting to break into the latest iPhone 16 Pro Max, there is a method for every gadget - each with its own share of challenges

Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location - via Security Latest
13/01/2025

Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location - via Security Latest

A hack of location data company Gravy Analytics has revealed which apps are—knowingly or not—being used to collect your information behind the scenes.

Robot Vacuums Hacked To Spy On Their Owners - via Cyber Security News
13/01/2025

Robot Vacuums Hacked To Spy On Their Owners - via Cyber Security News

Critical vulnerabilities in Ecovacs robot vacuums, enabling hackers to exploit these devices for surveillance and harassment.

L'iPad Pro che si autodistrugge in caso di morte dell'utente - via Wired Italia
13/01/2025

L'iPad Pro che si autodistrugge in caso di morte dell'utente - via Wired Italia

In case of death è uno dei gadget più curiosi e assurdi presentati al Ces 2025 di Las Vegas

Attacchi hacker filorussi all’Italia. Il cyber-caos come arma ibrida di Mosca - via James Bond Archivi - Formiche.net
13/01/2025

Attacchi hacker filorussi all’Italia. Il cyber-caos come arma ibrida di Mosca - via James Bond Archivi - Formiche.net

Hacker filorussi avrebbero colpito di nuovo l’Italia, obiettivo della guerra ibrida di Mosca. Zelensky e Quint le ragioni?

La verità nelle tracce - 120 anni di Polizia Scientifica - via Digital Forensics
09/01/2025

La verità nelle tracce - 120 anni di Polizia Scientifica - via Digital Forensics

Inviato da rebus il Mar, 07/01/2025 - 19:54 È in corso di svolgimento presso il Museo Nazionale della Scienza e della Tecnologia di Milano la mostra "La verità nelle tracce", dedicata alla storia della Polizia Scientifica. Come spiega il sito del museo, si tratta di un viaggio multimediale organiz...

09/01/2025

8 Essential OSINT tools collections for Digital Intelligence - via Andrea Fortuna

Open Source Intelligence (OSINT) is an invaluable skill for researchers, journalists, cybersecurity professionals, and anyone interested in gathering and analyzing publicly available information. Whether you’re conducting research, verifying facts, or exploring digital footprints, having the right...

How initial access brokers (IABs) sell your users’ credentials - via BleepingComputer
08/01/2025

How initial access brokers (IABs) sell your users’ credentials - via BleepingComputer

Initial Access Brokers (IABs) are specialized cybercriminals that break into corporate networks and sell stolen access to other attackers. Learn from Specops Software about how IABs operate and how businesses can protect themselves.

Address


Alerts

Be the first to know and let us send you an email when Rebus' Digest posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Shortcuts

  • Address
  • Alerts
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share