Loading...

News

Pegasus spyware: the dark side of surveillance 

Pegasus spyware is a surveillance tool developed by the israeli company NSO Group.   This highly sophisticated spyware is designed to infiltrate mobile phones without leaving a trace, allowing full remote access to infected devices. Pegasus has been described as one of the most invasive digital surveillance tools ever developed. It [...]

Guides

KeyRaider: how to protect yourself from ransomware on iOS 

In the increasingly connected world of mobile devices, cybersecurity has become a top priority. One of the most striking examples of threats targeting Apple users is KeyRaider. KeyRaider is a type of ransomware designed to specifically attack jailbroken iPhones. A jailbreak is a procedure that allows users to remove restrictions [...]

News

Alternate data streams and cyber security

Alternate data streams (ADS) represent an advanced feature of the NTFS file system that allows additional information to be associated with each file without changing its external appearance.  This feature, introduced with the Windows operating system starting with Windows 2000, offers interesting opportunities for storing hidden data, but also opens [...]

News

Mark of the Web: protection or risk?

The Mark of the Web (MOTW) is a security label automatically applied by the Windows operating system to files downloaded from the internet.   This feature was introduced to alert users of potentially malicious files that might contain malicious payloads or other security risks. The MOTW appears for most files [...]

News

Script kiddies: who they are and why they are dangerous 

Script kiddies are a category of inexperienced hackers who use pre-made tools and scripts to carry out cyber attacks without possessing real technical skills.  Also known as script kiddy or novice hackers, they venture into the world of hacking by using software that is easily available on the internet or [...]

News

Cyber threat actors: how to identify and prevent them

In the world of cyber security, threat actors represent one of the main threats to organizations and individuals.  But what is a threat actor, or rather who are threat actors?  They are individuals or groups that exploit vulnerabilities and weaknesses in digital systems for often malicious purposes.   Their main [...]

News

The Use-After-Free (UAF) bug: vulnerabilities and risks 

The security bug known as Use-After-Free is one of the most severe vulnerabilities in modern programming environments, compromising memory management and opening doors to dangerous arbitrary code execution exploits.  This type of vulnerability arises when a program continues to use a block of memory that has already been freed, or [...]

News

Jailbreak and cyber security risks

Jailbreak is a common practice among those who want greater control over their Apple or Android devices, bypassing the restrictions imposed by operating systems.  With jailbreak, the user gains access to the “root” of the system, allowing the installation of apps and customizations otherwise unavailable through official stores like the [...]

News

Man-in-the-mail scam: how to protect yourself 

News pages frequently mention cases of hackers intercepting emails and altering attachments, such as invoices, by modifying the IBAN details.  This is just one example of a common phenomenon known as "man-in-the-mail" fraud. The man-in-the-mail scam is a fraudulent scheme that exploits email communications to infiltrate business transactions, alter payment [...]

News

Sharenting: risks, psychology, and digital awareness

The term sharenting originates from the combination of the words "share" and "parenting". This phenomenon refers to the tendency of many parents to share online content, such as photos and videos, about their children on social media. The phenomenon of sharenting has gained prominence with the rise of social media, [...]

News

Protecting children on social media 

In recent years, social media has amassed millions of pieces of content related to daily life, including private snapshots of families and children. It's not uncommon to hear news stories warning about the dangers of sharing children's photos online: parents find their children's images stolen, misused for inappropriate purposes, or, in [...]

Guides

Ransomware as a service: how it works and why it’s concerning 

In recent years, cyberattacks using ransomware as a service (RaaS) have become one of the most concerning phenomena in cybersecurity. Among the most notable recent cases was the attack on Colonial Pipeline, a U.S. energy infrastructure company. Here, a group of threat actors used malware obtained from RaaS operators to [...]

Guides

Tabnabbing: the invisible threat in cyber security 

In recent years, cyber security has become a central issue, particularly due to the rise in sophisticated phishing attacks. Recently, there have been numerous reports of attacks on popular platforms where hackers successfully extract users' sensitive data without them immediately realizing it.  Among these threats, tabnabbing has emerged—a sneaky form of [...]

Guides

Dossiering and cyber security: protection and prevention 

Dossiering and information security: how to protect and prevent illegal activities.  Recently, Italy has witnessed numerous cases of dossiering involving prominent figures, including politicians and VIPs. One of the most notable cases, the Perugia investigation into dossiering, has attracted the attention of the national anti-mafia directorate and the Milan prosecutor's office. [...]

Guides

Clone phishing: how to defend against this type of fraud 

Clone phishing is a sophisticated cyberattack that aims to compromise access credentials and other sensitive data of its victims. It is an advanced variant of traditional phishing attacks, where the cybercriminal almost identically replicates a previous phishing email or other legitimate communication, but changes links or attachments to trick the [...]

Guides

The complete guide to the NIS2 Directive 

The NIS2 Directive is part of the European Union's strategy to protect its digital infrastructure and enhance cyber security. Published as an evolution of the first NIS Directive from 2016, NIS2 sets even more ambitious goals and came into effect on January 17, 2023. In Italy, NIS2 took effect on October [...]

Guides

Money muling: risks and scams related to money laundering 

Money muling is becoming increasingly common in cyber fraud and money laundering. But what exactly is money muling? Money muling refers to an illegal activity where a person, called a "money mule," agrees to transfer or deposit funds on behalf of others, often unaware they’re participating in criminal activity. In practice, [...]

News

Quishing: the dangers of phishing via QR codes 

In recent years, with the rise of mobile devices, a new cyber threat has emerged: quishing. This term refers to a specific type of phishing that uses QR codes to deceive users, encouraging them to scan a fraudulent QR code that redirects them to malicious websites. What is quishing and how [...]

Guides

How to create a SPID: complete guide

Table of contents The SPID (Public System for Digital Identity) is a digital authentication system that allows Italian citizens to securely and quickly access online services offered by public administrations and participating private entities. With a digital identity, you can manage numerous activities without having to physically visit offices or [...]

Guides

How to verify the authenticity of a website: an essential guide

Table of contents In an increasingly digital world, knowing how to verify the authenticity of a website is essential for protecting your personal data and sensitive information. The threat of fraudulent websites is real, and thousands of people fall victim to online scams every day. However, by following the correct [...]

Guides

Defending against session fixation: guide and remedies 

Session fixation is a type of cyberattack that occurs when a malicious actor forces a session identifier (session ID) onto a user before they log into a web application. This technique allows the attacker to gain access to the user's session once the user has authenticated. Although it is often [...]

Guides

Protect yourself from ‘Man in the Browser’

The Man in the Browser (MITB) attack represents a sneaky and increasingly prevalent threat in the world of cyber security.This type of attack occurs within web browsers, where a malicious actor manages to compromise the web pages viewed by the user, altering them without the user realizing it. The primary [...]

Guides

Security in peer-to-peer connections: advantages and risks 

Peer-to-peer connections (often abbreviated as P2P) represent a type of network in which computers, known as nodes, communicate directly with each other without the need for a central server. This distributed model offers numerous advantages but also presents some challenges, especially in terms of security.  The peer-to-peer model is different [...]

Guides

Defending web sessions: how to avoid session hijacking 

Session hijacking is one of the most insidious threats in the world of cybersecurity. This type of attack allows a malicious actor to take control of a user's web session, granting unauthorized access to sensitive data and restricted functionalities of a website or application. Session hijacking is particularly concerning for [...]

To top