Loading...
NIS Directive to NIS 2

Governance

ACN: National Competent Authority for NIS 2 in Italy 

20 December 2024

The growing complexity of networks and IT systems requires a coordinated approach to network security at both national and international levels.  With the introduction of the EU Directive 2022/2555, also known as NIS 2, European Union member states are tasked…
L’agenzia per la cybersicurezza nazionale (ACN).

Governance

The Cyber Security Core: what it is and what it does 

20 December 2024

As often highlighted on this blog, cyber security is a strategic priority for the security of the Republic.  At the center of this protective network lies the Cyber Security Core, established within the National Cyber Security Agency (ACN).  It plays…
Protection from cyber threats

Governance

CSIRT: the heart of cyber security 

20 December 2024

CSIRT, an acronym for Computer Security Incident Response Team, is a critical entity in managing cyber security incidents and protecting against cyber threats. It is a specialized unit that intervenes in the event of cyber incidents, providing technical support, coordinating…
Cyber Solidarity Act

Governance

A new EU cyber security package is coming 

20 December 2024

On December 2, 2024, the European Council announced a new cyber security package adopted by the Council of the European Union, marking a crucial step toward a safer and more resilient Europe against cyber threats.  This initiative, comprising the Cyber…

Most Viewed

Latest Posts

Guides

Cyber security supply chain: protection and risk management 

Cyber security in the supply chain represents a critical challenge for modern businesses, which are increasingly interconnected and dependent on a vast network of suppliers and technology partners.  Supply chain cyber security is a priority not only for large organizations but also for small and medium enterprises, as supply chain [...]

Guides

Pop-up phishing: what it is and how to protect yourself 

Pop-up phishing is a technique used by cybercriminals to deceive people online and gain access to personal information and sensitive data. This specific form of phishing uses pop-up windows that suddenly appear on a user’s screen, often imitating legitimate security alerts from trusted companies like tech service providers or banks.  [...]

Guides

SEO poisoning: online risks and prevention 

SEO poisoning is a manipulation technique of search engines aimed at positioning malicious websites high in search engine results. This practice exploits search engine optimization (SEO) techniques not to promote legitimate content but to drive users to harmful sites that could compromise their security.  The most common goal of SEO [...]

Guides

Search engine phishing: how to protect yourself online 

Search engine phishing is a phishing technique that exploits search engines to lure people into visiting malicious websites, passing them off as reliable sources or legitimate sites.  This deceptive method has become increasingly sophisticated over time and represents a growing threat to online users.  Unlike traditional phishing scams, which typically [...]

News

Cash trapping: the ATM scam

What is cash trapping? Cash trapping is a sophisticated, internationally widespread scam that exploits normal ATM withdrawal processes to steal money from unsuspecting victims. Unlike other banking frauds, such as skimming, cash trapping does not steal sensitive data or PIN codes.  Instead, the trick involves physically blocking the cash during [...]

Guides

Phishing via PEC: how to defend against scam attempts 

The phenomenon of phishing has seen a steady increase, and certified email (PEC) has also become a target for scammers.  PEC, which ensures the authenticity and traceability of communications, is now widely used by businesses, professionals, and citizens, especially in Italy, where it is also utilized for interactions with public [...]

Guides

SocGholish malware: how it works and how to protect yourself 

In recent years, SocGholish malware has emerged as a significant threat in the cyber security landscape, tricking users and spreading through compromised websites. This type of malware skillfully employs social engineering techniques to convince victims to install a malicious JavaScript payload disguised as a fake browser update. Understanding how SocGholish [...]

News

Agent Tesla: the malware that spies and steals sensitive data 

In recent years, Agent Tesla has emerged as one of the preferred tools for cybercriminals to conduct espionage campaigns and data theft.  This malware is known as a Remote Access Trojan (RAT), specialized in gathering sensitive information from infected users.  Originally developed as a malware as a service (MaaS), Agent [...]

News

Asnarok: the malware exploiting Sophos vulnerabilities 

The Asnarok malware is a complex malware that exploited vulnerabilities in Sophos XG firewalls, particularly through techniques such as remote code execution and sql injection. This attack had a major impact on companies and organizations, compromising not only the security of corporate networks but also the confidentiality of data. By [...]

News

Threat intelligence: protection for cyber security 

Threat intelligence is one of the most advanced practices in the field of cyber security. It is an approach based on the collection and analysis of data about actual or potential cyber threats, the goal of which is to identify and prevent attacks against organizations. The increasing complexity of the [...]

Guides

Password spray: prevention and detection 

Password spraying is a widely used attack technique in cyber security that is often underestimated compared to other strategies such as brute force attack. This attack aims to compromise a large number of user accounts by using more common password combinations across a large group of accounts. Unlike the traditional [...]

Guides

Deepfake and cyber security: risks and solutions

Deepfakes are becoming increasingly sophisticated and pose a significant threat in cyber security. But what is deepfake and what dangers can it generate in cyber security? The term deepfake refers to media content modified through machine learning, which can drastically transform or alter facial expressions, voices, and movements of people [...]

To top