Guides Technical guides
16 January 2025
In the era of Industry 4.0, the interconnection between IT systems and operational technologies (OT) has revolutionized industrial processes, enhancing efficiency and productivity. However, this evolution has also introduced new vulnerabilities, making OT security a strategic priority for businesses. Operational Technology security, often abbreviated as OT security, refers to measures [...]
10 January 2025
SSL stripping, also known as SSL channel strip, is a cyberattack technique where a hacker downgrades a secure HTTPS connection to a less secure HTTP connection. This type of attack, often associated with a man-in-the-middle scenario, allows attackers to intercept data transmitted between the user's browser and the server, exposing [...]
9 January 2025
The digital euro is a new frontier in the world of digital payments, designed as an electronic version of cash. According to the official website of the European Central Bank, the digital euro is a modern and free alternative to traditional payment systems. In this article, we will explore what [...]
7 January 2025
In recent years, artificial intelligence (AI) has become a fundamental tool for cyber security, serving both to enhance defense strategies and to create new methods of cyber attack. The constant growth of cyber threats, along with increasingly targeted and complex attacks, has made an advanced technological approach essential for protecting [...]
6 January 2025
The cryptocurrency world is expanding rapidly, attracting more investors with the promise of high profits and secure transactions. However, as these digital assets have become more widespread, so has the attention of hackers, who see digital currencies as an opportunity for illicit gains. A cryptocurrency hack can cause significant financial [...]
3 January 2025
If your Gmail account has been hacked, it means one or more malicious actors have gained unauthorized access to your email address. Hacking Gmail accounts is a daily activity attempted by hacker groups worldwide. This situation represents a serious risk to your online security, as your personal data and information [...]
2 January 2025
An Instagram account blocked for phishing is an increasingly common problem in the age of social networking. The block occurs when the system detects suspicious activity that could indicate a phishing attack. Phishing on Instagram often begins with a convincing message, apparently sent by the official team, inviting users to [...]
23 December 2024
In recent years, remote work has become an integral part of many companies' work strategies, transforming the way employees perform their daily tasks. This new way of working, known as smart working, offers greater flexibility but also introduces new challenges in the field of cyber security. With the rise of [...]
19 December 2024
The evolution of artificial intelligence models like ChatGPT offers tremendous opportunities, but it also brings new challenges for cyber security. The use of ChatGPT for communication and data management presents some cyber security risks that cannot be underestimated. Cyber attacks such as phishing, data theft, and manipulation of sensitive [...]
13 December 2024
Cyber security in the supply chain represents a critical challenge for modern businesses, which are increasingly interconnected and dependent on a vast network of suppliers and technology partners. Supply chain cyber security is a priority not only for large organizations but also for small and medium enterprises, as supply chain [...]
11 December 2024
SEO poisoning is a manipulation technique of search engines aimed at positioning malicious websites high in search engine results. This practice exploits search engine optimization (SEO) techniques not to promote legitimate content but to drive users to harmful sites that could compromise their security. The most common goal of SEO [...]
10 December 2024
Search engine phishing is a phishing technique that exploits search engines to lure people into visiting malicious websites, passing them off as reliable sources or legitimate sites. This deceptive method has become increasingly sophisticated over time and represents a growing threat to online users. Unlike traditional phishing scams, which typically [...]
9 December 2024
What is cash trapping? Cash trapping is a sophisticated, internationally widespread scam that exploits normal ATM withdrawal processes to steal money from unsuspecting victims. Unlike other banking frauds, such as skimming, cash trapping does not steal sensitive data or PIN codes. Instead, the trick involves physically blocking the cash during [...]
6 December 2024
The phenomenon of phishing has seen a steady increase, and certified email (PEC) has also become a target for scammers. PEC, which ensures the authenticity and traceability of communications, is now widely used by businesses, professionals, and citizens, especially in Italy, where it is also utilized for interactions with public [...]
2 December 2024
Threat intelligence is one of the most advanced practices in the field of cyber security. It is an approach based on the collection and analysis of data about actual or potential cyber threats, the goal of which is to identify and prevent attacks against organizations. The increasing complexity of the [...]
29 November 2024
Password spraying is a widely used attack technique in cyber security that is often underestimated compared to other strategies such as brute force attack. This attack aims to compromise a large number of user accounts by using more common password combinations across a large group of accounts. Unlike the traditional [...]
28 November 2024
Deepfakes are becoming increasingly sophisticated and pose a significant threat in cyber security. But what is deepfake and what dangers can it generate in cyber security? The term deepfake refers to media content modified through machine learning, which can drastically transform or alter facial expressions, voices, and movements of people [...]
26 November 2024
In the increasingly connected world of mobile devices, cybersecurity has become a top priority. One of the most striking examples of threats targeting Apple users is KeyRaider. KeyRaider is a type of ransomware designed to specifically attack jailbroken iPhones. A jailbreak is a procedure that allows users to remove restrictions [...]
25 November 2024
Alternate data streams (ADS) represent an advanced feature of the NTFS file system that allows additional information to be associated with each file without changing its external appearance. This feature, introduced with the Windows operating system starting with Windows 2000, offers interesting opportunities for storing hidden data, but also opens [...]
22 November 2024
The Mark of the Web (MOTW) is a security label automatically applied by the Windows operating system to files downloaded from the internet. This feature was introduced to alert users of potentially malicious files that might contain malicious payloads or other security risks. The MOTW appears for most files [...]
19 November 2024
The security bug known as Use-After-Free is one of the most severe vulnerabilities in modern programming environments, compromising memory management and opening doors to dangerous arbitrary code execution exploits. This type of vulnerability arises when a program continues to use a block of memory that has already been freed, or [...]
15 November 2024
News pages frequently mention cases of hackers intercepting emails and altering attachments, such as invoices, by modifying the IBAN details. This is just one example of a common phenomenon known as "man-in-the-mail" fraud. The man-in-the-mail scam is a fraudulent scheme that exploits email communications to infiltrate business transactions, alter payment [...]
12 November 2024
In recent years, cyberattacks using ransomware as a service (RaaS) have become one of the most concerning phenomena in cybersecurity. Among the most notable recent cases was the attack on Colonial Pipeline, a U.S. energy infrastructure company. Here, a group of threat actors used malware obtained from RaaS operators to [...]
11 November 2024
In recent years, cyber security has become a central issue, particularly due to the rise in sophisticated phishing attacks. Recently, there have been numerous reports of attacks on popular platforms where hackers successfully extract users' sensitive data without them immediately realizing it. Among these threats, tabnabbing has emerged—a sneaky form of [...]