Loading...
The country's digital protection

Governance

NIS 2 Directive and the National Cyber Security Strategy

20 December 2024

The 2022-2026 National Cyber security Strategy is a cornerstone for Italy's cyber resilience and digital protection. The objectives of the national cyber security strategy include: :  Ensuring a high level of security for critical infrastructures, protecting strategic sectors such as…
NIS Directive to NIS 2

Governance

ACN: National Competent Authority for NIS 2 in Italy 

20 December 2024

The growing complexity of networks and IT systems requires a coordinated approach to network security at both national and international levels.  With the introduction of the EU Directive 2022/2555, also known as NIS 2, European Union member states are tasked…
L’agenzia per la cybersicurezza nazionale (ACN).

Governance

The Cyber Security Core: what it is and what it does 

20 December 2024

As often highlighted on this blog, cyber security is a strategic priority for the security of the Republic.  At the center of this protective network lies the Cyber Security Core, established within the National Cyber Security Agency (ACN).  It plays…
Protection from cyber threats

Governance

CSIRT: the heart of cyber security 

20 December 2024

CSIRT, an acronym for Computer Security Incident Response Team, is a critical entity in managing cyber security incidents and protecting against cyber threats. It is a specialized unit that intervenes in the event of cyber incidents, providing technical support, coordinating…

Most Viewed

Latest Posts

News

Pegasus spyware: the dark side of surveillance 

Pegasus spyware is a surveillance tool developed by the israeli company NSO Group.   This highly sophisticated spyware is designed to infiltrate mobile phones without leaving a trace, allowing full remote access to infected devices. Pegasus has been described as one of the most invasive digital surveillance tools ever developed. It [...]

Guides

KeyRaider: how to protect yourself from ransomware on iOS 

In the increasingly connected world of mobile devices, cybersecurity has become a top priority. One of the most striking examples of threats targeting Apple users is KeyRaider. KeyRaider is a type of ransomware designed to specifically attack jailbroken iPhones. A jailbreak is a procedure that allows users to remove restrictions [...]

News

Alternate data streams and cyber security

Alternate data streams (ADS) represent an advanced feature of the NTFS file system that allows additional information to be associated with each file without changing its external appearance.  This feature, introduced with the Windows operating system starting with Windows 2000, offers interesting opportunities for storing hidden data, but also opens [...]

News

Mark of the Web: protection or risk?

The Mark of the Web (MOTW) is a security label automatically applied by the Windows operating system to files downloaded from the internet.   This feature was introduced to alert users of potentially malicious files that might contain malicious payloads or other security risks. The MOTW appears for most files [...]

News

Script kiddies: who they are and why they are dangerous 

Script kiddies are a category of inexperienced hackers who use pre-made tools and scripts to carry out cyber attacks without possessing real technical skills.  Also known as script kiddy or novice hackers, they venture into the world of hacking by using software that is easily available on the internet or [...]

News

Cyber threat actors: how to identify and prevent them

In the world of cyber security, threat actors represent one of the main threats to organizations and individuals.  But what is a threat actor, or rather who are threat actors?  They are individuals or groups that exploit vulnerabilities and weaknesses in digital systems for often malicious purposes.   Their main [...]

News

The Use-After-Free (UAF) bug: vulnerabilities and risks 

The security bug known as Use-After-Free is one of the most severe vulnerabilities in modern programming environments, compromising memory management and opening doors to dangerous arbitrary code execution exploits.  This type of vulnerability arises when a program continues to use a block of memory that has already been freed, or [...]

News

Jailbreak and cyber security risks

Jailbreak is a common practice among those who want greater control over their Apple or Android devices, bypassing the restrictions imposed by operating systems.  With jailbreak, the user gains access to the “root” of the system, allowing the installation of apps and customizations otherwise unavailable through official stores like the [...]

News

Man-in-the-mail scam: how to protect yourself 

News pages frequently mention cases of hackers intercepting emails and altering attachments, such as invoices, by modifying the IBAN details.  This is just one example of a common phenomenon known as "man-in-the-mail" fraud. The man-in-the-mail scam is a fraudulent scheme that exploits email communications to infiltrate business transactions, alter payment [...]

News

Sharenting: risks, psychology, and digital awareness

The term sharenting originates from the combination of the words "share" and "parenting". This phenomenon refers to the tendency of many parents to share online content, such as photos and videos, about their children on social media. The phenomenon of sharenting has gained prominence with the rise of social media, [...]

News

Protecting children on social media 

In recent years, social media has amassed millions of pieces of content related to daily life, including private snapshots of families and children. It's not uncommon to hear news stories warning about the dangers of sharing children's photos online: parents find their children's images stolen, misused for inappropriate purposes, or, in [...]

Guides

Ransomware as a service: how it works and why it’s concerning 

In recent years, cyberattacks using ransomware as a service (RaaS) have become one of the most concerning phenomena in cybersecurity. Among the most notable recent cases was the attack on Colonial Pipeline, a U.S. energy infrastructure company. Here, a group of threat actors used malware obtained from RaaS operators to [...]

To top