Governance
20 Dicembre 2024
As often highlighted on this blog, cyber security is a strategic priority for the security of the Republic. At the center of this protective network lies the Cyber Security Core, established within the National Cyber Security Agency (ACN). It plays a fundamental role in the cyber security area by ensuring [...]
CSIRT, an acronym for Computer Security Incident Response Team, is a critical entity in managing cyber security incidents and protecting against cyber threats. It is a specialized unit that intervenes in the event of cyber incidents, providing technical support, coordinating responses, and promoting information sharing among stakeholders. In Italy, CSIRT [...]
On December 2, 2024, the European Council announced a new cyber security package adopted by the Council of the European Union, marking a crucial step toward a safer and more resilient Europe against cyber threats. This initiative, comprising the Cyber Solidarity Act and a targeted amendment to the Cyber Security [...]
The NIS Cooperation Group, established under Article 14 of Directive (EU) 2022/2555, serves as a strategic tool to promote network and system security across the European Union. Formed with the aim of facilitating strategic cooperation and information exchange among Member States, the group seeks to strengthen trust and promote the [...]
Sectoral NIS authorities play a fundamental role in protecting critical infrastructures and ensuring digital resilience in an era of increasing cyber threats. With the adoption of Legislative Decree No. 138 of September 4, 2024, Italy aligned itself with the European framework for Network and Information Security (NIS 2 Directive), redefining [...]
The 2022-2026 National Cyber security Strategy is a cornerstone for Italy's cyber resilience and digital protection. The objectives of the national cyber security strategy include: : Ensuring a high level of security for critical infrastructures, protecting strategic sectors such as energy, transportation, and healthcare. Strengthening the resilience of public administrations [...]
The growing complexity of networks and IT systems requires a coordinated approach to network security at both national and international levels. With the introduction of the EU Directive 2022/2555, also known as NIS 2, European Union member states are tasked with ensuring a high common level of protection for critical [...]
News
Artificial intelligence and social media are reshaping the digital world at an unprecedented pace. AI and social media have become a powerful combination to improve user experience and security, but they also raise numerous cyber security issues. With the support of AI algorithms and advanced machine learning techniques, social media [...]
Guides
19 Dicembre 2024
The evolution of artificial intelligence models like ChatGPT offers tremendous opportunities, but it also brings new challenges for cyber security. The use of ChatGPT for communication and data management presents some cyber security risks that cannot be underestimated. Cyber attacks such as phishing, data theft, and manipulation of sensitive [...]
18 Dicembre 2024
The Remcos RAT is an advanced malware that has raised concerns within the cyber security community in recent years. Originally developed by Xiaopeng Zhang as a Remote Administration Tool (RAT) for legitimate purposes. However, has proven to be flexible and powerful enough to be misused by cyber criminals to remotely [...]
17 Dicembre 2024
Water hole phishing, also known as watering hole phishing, is a sophisticated cyber attack technique aimed at compromising the security of specific groups of users. The target of this type of phishing attack is not an individual, but rather a group that frequently visits online sites, used as traps to [...]
16 Dicembre 2024
The digital world is evolving rapidly, and cyber security has become one of the most crucial disciplines to protect systems and sensitive data. Pursuing a degree in cyber security provides technical and analytical skills to tackle cyber threats, safeguard information, and develop security solutions for systems. With a growing demand [...]
13 Dicembre 2024
Cyber security in the supply chain represents a critical challenge for modern businesses, which are increasingly interconnected and dependent on a vast network of suppliers and technology partners. Supply chain cyber security is a priority not only for large organizations but also for small and medium enterprises, as supply chain [...]
12 Dicembre 2024
Pop-up phishing is a technique used by cybercriminals to deceive people online and gain access to personal information and sensitive data. This specific form of phishing uses pop-up windows that suddenly appear on a user’s screen, often imitating legitimate security alerts from trusted companies like tech service providers or banks. [...]
11 Dicembre 2024
SEO poisoning is a manipulation technique of search engines aimed at positioning malicious websites high in search engine results. This practice exploits search engine optimization (SEO) techniques not to promote legitimate content but to drive users to harmful sites that could compromise their security. The most common goal of SEO [...]
10 Dicembre 2024
Search engine phishing is a phishing technique that exploits search engines to lure people into visiting malicious websites, passing them off as reliable sources or legitimate sites. This deceptive method has become increasingly sophisticated over time and represents a growing threat to online users. Unlike traditional phishing scams, which typically [...]
9 Dicembre 2024
What is cash trapping? Cash trapping is a sophisticated, internationally widespread scam that exploits normal ATM withdrawal processes to steal money from unsuspecting victims. Unlike other banking frauds, such as skimming, cash trapping does not steal sensitive data or PIN codes. Instead, the trick involves physically blocking the cash during [...]
6 Dicembre 2024
The phenomenon of phishing has seen a steady increase, and certified email (PEC) has also become a target for scammers. PEC, which ensures the authenticity and traceability of communications, is now widely used by businesses, professionals, and citizens, especially in Italy, where it is also utilized for interactions with public [...]
5 Dicembre 2024
In recent years, SocGholish malware has emerged as a significant threat in the cyber security landscape, tricking users and spreading through compromised websites. This type of malware skillfully employs social engineering techniques to convince victims to install a malicious JavaScript payload disguised as a fake browser update. Understanding how SocGholish [...]
4 Dicembre 2024
In recent years, Agent Tesla has emerged as one of the preferred tools for cybercriminals to conduct espionage campaigns and data theft. This malware is known as a Remote Access Trojan (RAT), specialized in gathering sensitive information from infected users. Originally developed as a malware as a service (MaaS), Agent [...]
3 Dicembre 2024
The Asnarok malware is a complex malware that exploited vulnerabilities in Sophos XG firewalls, particularly through techniques such as remote code execution and sql injection. This attack had a major impact on companies and organizations, compromising not only the security of corporate networks but also the confidentiality of data. By [...]
2 Dicembre 2024
Threat intelligence is one of the most advanced practices in the field of cyber security. It is an approach based on the collection and analysis of data about actual or potential cyber threats, the goal of which is to identify and prevent attacks against organizations. The increasing complexity of the [...]
29 Novembre 2024
Password spraying is a widely used attack technique in cyber security that is often underestimated compared to other strategies such as brute force attack. This attack aims to compromise a large number of user accounts by using more common password combinations across a large group of accounts. Unlike the traditional [...]
28 Novembre 2024
Deepfakes are becoming increasingly sophisticated and pose a significant threat in cyber security. But what is deepfake and what dangers can it generate in cyber security? The term deepfake refers to media content modified through machine learning, which can drastically transform or alter facial expressions, voices, and movements of people [...]