Guides
29 Aprile 2025
Cyber security is a critical aspect of software and IT system development. However, security is often treated as an afterthought—something to be patched once vulnerabilities emerge. This is where Secure by Design comes into play: an approach that integrates security from the very beginning of software, hardware, and infrastructure development. [...]
News
In today’s digital landscape, cyber security can no longer be an afterthought. Cyber threats are constantly evolving, and systems must be designed to be secure from the very first use, without requiring complex configurations from users. This is where the concept of Secure by Default comes into play—an approach increasingly [...]
28 Aprile 2025
Apple has adopted a rigorous approach to data security, integrating encryption across its primary services. End-to-end encryption ensures that only the sender and recipient can read messages or access protected content. Even if someone intercepts the data, they cannot decrypt it without the correct key. Apple’s systems use unique encryption [...]
Storing your data in the cloud has become a daily habit, but how safe is your information really when stored online? Apple, always focused on privacy, has introduced the Advanced Data Protection feature to strengthen iCloud security. But does this solution truly guarantee complete protection? In this article, we’ll explore [...]
24 Aprile 2025
In the age of digital surveillance, maintaining online privacy is becoming increasingly difficult. Every action on the internet leaves traces that can be monitored by ISPs, corporations, and governments. For those seeking a secure and anonymous alternative, I2P (Invisible Internet Project) is a powerful solution. This article explores how this [...]
News Flash
In 2024, cyberattacks have grown at an alarming rate, with a 15.4% increase in data breach alerts related to the dark web. Over 2 million alerts have been issued to Italian users, a clear sign that the country is under serious digital threat. Only 12% of the alerts concern public [...]
Threats
23 Aprile 2025
Dwell Time is one of the most critical risk indicators in cyber security. It refers to the time between an attacker gaining unauthorized access to a system and the moment their presence is detected and removed. The longer this period, the more opportunities the attacker has to move laterally, exfiltrate [...]
In recent years, online privacy has become a major concern for internet users worldwide. With increasing digital surveillance and cyber threats, more people are looking for ways to protect their identities online. In this context, Tor Browser is one of the most effective tools for anonymous and secure web browsing. [...]
22 Aprile 2025
The Dark Web is one of the most misunderstood areas of the internet. Often associated with criminal activity, hacking, and illicit markets, it has also become a space for privacy advocates, journalists, and whistleblowers seeking anonymity. But what really happens in these hidden corners of the web? Is it as [...]
Governance
In today’s digital landscape, cyber threats pose a growing danger to national security, businesses, and public institutions. Italy’s CNAIPIC (Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche) is the specialized unit of the Postal and Communications Police Service responsible for the repression of cyber crimes. This agency is [...]
18 Aprile 2025
On March 21, 2025, a post on an underground forum caused a stir in the cyber security world. A user named rose87168 claimed to have breached the Oracle Cloud login endpoint (login.[region-name].oraclecloud.com), gaining access to JKS files, encrypted SSO passwords, LDAP hashes, and JPS keys. What’s more, the attacker allegedly [...]
The new Cyber Index PMI report, developed by Confindustria and Generali, reveals a concerning picture: the majority of small and medium Italian enterprises are unprepared to face digital threats. The study, which involved over 1,000 companies, shows that only 15% of SMEs have adopted a strategic approach to assess and [...]
17 Aprile 2025
The Cyber Security and Infrastructure Security Agency (CISA), created in 2018 to protect U.S. critical infrastructure, is now facing severe downsizing. Backed by the Department of Government Efficiency (DOGE) and aligned with the Project 2025 vision of the Heritage Foundation, President Trump has launched a plan that significantly undermines federal [...]
In recent years, NPM (Node Package Manager) has become an essential tool for JavaScript developers, allowing them to integrate thousands of open-source libraries into their projects effortlessly. However, this convenience comes with significant cyber security risks. Attackers exploit vulnerabilities in open-source dependencies to inject malicious code, steal sensitive data, or [...]
16 Aprile 2025
The Lazarus APT Group is one of the most feared threat actors in the world of cyber security. Believed to be linked to North Korea, this group has been responsible for some of the most devastating cyberattacks in history, including the infamous 2014 Sony Pictures hack. Their operations extend across [...]
The internet is full of hidden threats, and one of the most deceptive is typosquatting. This technique takes advantage of misspellings made by users when typing a website URL into their web browser. A small typo can lead users to a similar domain, controlled by cybercriminals, who exploit the traffic [...]
15 Aprile 2025
In the summer of 2023, Wiz made headlines by rejecting a $23 billion offer from Google. The company instead set its sights on a potential IPO, aiming for $1 billion in recurring revenue, having already reached $350 million by the end of 2024. That bold move just paid off: Alphabet, [...]
On March 18, 2025, the U.S. Court of Appeals for the D.C. Circuit issued a landmark ruling that will shape the global debate on copyright protection for AI-generated works. In a detailed and legally structured decision, the court reaffirmed that only a human being can be considered an author under [...]
14 Aprile 2025
The cyber security landscape has become increasingly complex, with sophisticated attacks and exponentially growing data volumes. In this scenario, Security Information and Event Management (SIEM) has emerged as an essential tool for threat detection, incident management, and regulatory compliance. But what exactly is a SIEM system, and how does it [...]
As businesses increasingly rely on mobile devices, managing security, compliance, and data access has become a top priority for IT teams. Mobile Device Management (MDM) is a set of technologies and policies that enable organizations to control, secure, and enforce policies on mobile devices such as smartphones, tablets, and laptops. [...]
11 Aprile 2025
Online authentication and authorization are essential for securing user data and managing access permissions. OAuth 2.0 is a widely adopted open standard that enables users to obtain access to online services without sharing their credentials directly. It is used by major platforms such as Google, Facebook, and Amazon to facilitate [...]
In today's digital world, managing multiple passwords for different websites and applications can be frustrating and insecure. Single sign-on (SSO) is an authentication method that allows users to access multiple services with a single set of credentials. By eliminating the need for multiple logins, SSO enhances both security and user [...]
10 Aprile 2025
In recent years, the demand for secure communications and global Internet access has driven governments and corporations to invest in satellite constellations. The European Union has launched IRIS² (Infrastructure for Resilience, Interconnectivity, and Security by Satellite) to ensure secure connectivity for institutions, businesses, and European citizens. With a budget of [...]
The European Union is taking a major step forward in cyber security crisis management with the introduction of the EU Cyber Security Blueprint, a framework designed to improve the coordinated response to cyber security threats across EU Member States. Presented by the European Commission on February 24, 2025, this updated [...]