Loading...

Governance

The Cyber Security Core: what it is and what it does 

As often highlighted on this blog, cyber security is a strategic priority for the security of the Republic.  At the center of this protective network lies the Cyber Security Core, established within the National Cyber Security Agency (ACN).  It plays a fundamental role in the cyber security area by ensuring [...]

Governance

CSIRT: the heart of cyber security 

CSIRT, an acronym for Computer Security Incident Response Team, is a critical entity in managing cyber security incidents and protecting against cyber threats. It is a specialized unit that intervenes in the event of cyber incidents, providing technical support, coordinating responses, and promoting information sharing among stakeholders.  In Italy, CSIRT [...]

Governance

A new EU cyber security package is coming 

On December 2, 2024, the European Council announced a new cyber security package adopted by the Council of the European Union, marking a crucial step toward a safer and more resilient Europe against cyber threats.  This initiative, comprising the Cyber Solidarity Act and a targeted amendment to the Cyber Security [...]

Governance

NIS Cooperation Group: what it is and how it works 

The NIS Cooperation Group, established under Article 14 of Directive (EU) 2022/2555, serves as a strategic tool to promote network and system security across the European Union.  Formed with the aim of facilitating strategic cooperation and information exchange among Member States, the group seeks to strengthen trust and promote the [...]

Governance

Sectoral NIS authorities: functions and competencies 

Sectoral NIS authorities play a fundamental role in protecting critical infrastructures and ensuring digital resilience in an era of increasing cyber threats.  With the adoption of Legislative Decree No. 138 of September 4, 2024, Italy aligned itself with the European framework for Network and Information Security (NIS 2 Directive), redefining [...]

Governance

NIS 2 Directive and the National Cyber Security Strategy

The 2022-2026 National Cyber security Strategy is a cornerstone for Italy's cyber resilience and digital protection. The objectives of the national cyber security strategy include: :  Ensuring a high level of security for critical infrastructures, protecting strategic sectors such as energy, transportation, and healthcare.  Strengthening the resilience of public administrations [...]

Governance

ACN: National Competent Authority for NIS 2 in Italy 

The growing complexity of networks and IT systems requires a coordinated approach to network security at both national and international levels.  With the introduction of the EU Directive 2022/2555, also known as NIS 2, European Union member states are tasked with ensuring a high common level of protection for critical [...]

News

Social media security and artificial intelligence 

Artificial intelligence and social media are reshaping the digital world at an unprecedented pace. AI and social media have become a powerful combination to improve user experience and security, but they also raise numerous cyber security issues.  With the support of AI algorithms and advanced machine learning techniques, social media [...]

Guides

ChatGPT and cyber security: risks and solutions

The evolution of artificial intelligence models like ChatGPT offers tremendous opportunities, but it also brings new challenges for cyber security. The use of ChatGPT for communication and data management presents some cyber security risks that cannot be underestimated.   Cyber attacks such as phishing, data theft, and manipulation of sensitive [...]

News

Remcos RAT: the remote access Trojan

The Remcos RAT is an advanced malware that has raised concerns within the cyber security community in recent years.   Originally developed by Xiaopeng Zhang as a Remote Administration Tool (RAT) for legitimate purposes. However, has proven to be flexible and powerful enough to be misused by cyber criminals to remotely [...]

Guides

Water hole phishing: how it works 

Water hole phishing, also known as watering hole phishing, is a sophisticated cyber attack technique aimed at compromising the security of specific groups of users.   The target of this type of phishing attack is not an individual, but rather a group that frequently visits online sites, used as traps to [...]

News

Degree in cyber security: what outlets? 

The digital world is evolving rapidly, and cyber security has become one of the most crucial disciplines to protect systems and sensitive data.  Pursuing a degree in cyber security provides technical and analytical skills to tackle cyber threats, safeguard information, and develop security solutions for systems.  With a growing demand [...]

Guides

Cyber security supply chain: protection and risk management 

Cyber security in the supply chain represents a critical challenge for modern businesses, which are increasingly interconnected and dependent on a vast network of suppliers and technology partners.  Supply chain cyber security is a priority not only for large organizations but also for small and medium enterprises, as supply chain [...]

Guides

Pop-up phishing: what it is and how to protect yourself 

Pop-up phishing is a technique used by cybercriminals to deceive people online and gain access to personal information and sensitive data. This specific form of phishing uses pop-up windows that suddenly appear on a user’s screen, often imitating legitimate security alerts from trusted companies like tech service providers or banks.  [...]

Guides

SEO poisoning: online risks and prevention 

SEO poisoning is a manipulation technique of search engines aimed at positioning malicious websites high in search engine results. This practice exploits search engine optimization (SEO) techniques not to promote legitimate content but to drive users to harmful sites that could compromise their security.  The most common goal of SEO [...]

Guides

Search engine phishing: how to protect yourself online 

Search engine phishing is a phishing technique that exploits search engines to lure people into visiting malicious websites, passing them off as reliable sources or legitimate sites.  This deceptive method has become increasingly sophisticated over time and represents a growing threat to online users.  Unlike traditional phishing scams, which typically [...]

News

Cash trapping: the ATM scam

What is cash trapping? Cash trapping is a sophisticated, internationally widespread scam that exploits normal ATM withdrawal processes to steal money from unsuspecting victims. Unlike other banking frauds, such as skimming, cash trapping does not steal sensitive data or PIN codes.  Instead, the trick involves physically blocking the cash during [...]

Guides

Phishing via PEC: how to defend against scam attempts 

The phenomenon of phishing has seen a steady increase, and certified email (PEC) has also become a target for scammers.  PEC, which ensures the authenticity and traceability of communications, is now widely used by businesses, professionals, and citizens, especially in Italy, where it is also utilized for interactions with public [...]

Guides

SocGholish malware: how it works and how to protect yourself 

In recent years, SocGholish malware has emerged as a significant threat in the cyber security landscape, tricking users and spreading through compromised websites. This type of malware skillfully employs social engineering techniques to convince victims to install a malicious JavaScript payload disguised as a fake browser update. Understanding how SocGholish [...]

News

Agent Tesla: the malware that spies and steals sensitive data 

In recent years, Agent Tesla has emerged as one of the preferred tools for cybercriminals to conduct espionage campaigns and data theft.  This malware is known as a Remote Access Trojan (RAT), specialized in gathering sensitive information from infected users.  Originally developed as a malware as a service (MaaS), Agent [...]

News

Asnarok: the malware exploiting Sophos vulnerabilities 

The Asnarok malware is a complex malware that exploited vulnerabilities in Sophos XG firewalls, particularly through techniques such as remote code execution and sql injection. This attack had a major impact on companies and organizations, compromising not only the security of corporate networks but also the confidentiality of data. By [...]

News

Threat intelligence: protection for cyber security 

Threat intelligence is one of the most advanced practices in the field of cyber security. It is an approach based on the collection and analysis of data about actual or potential cyber threats, the goal of which is to identify and prevent attacks against organizations. The increasing complexity of the [...]

Guides

Password spray: prevention and detection 

Password spraying is a widely used attack technique in cyber security that is often underestimated compared to other strategies such as brute force attack. This attack aims to compromise a large number of user accounts by using more common password combinations across a large group of accounts. Unlike the traditional [...]

Guides

Deepfake and cyber security: risks and solutions

Deepfakes are becoming increasingly sophisticated and pose a significant threat in cyber security. But what is deepfake and what dangers can it generate in cyber security? The term deepfake refers to media content modified through machine learning, which can drastically transform or alter facial expressions, voices, and movements of people [...]

To top