The XSS threat and the role of the WAF
Among the cyber attacks that exploit script injection methodologies, Cross Site Scripting (XSS) is certainly one of the most famous and in this short article I will try to...
Read
How to trick defenses to do a SQL attack with JSON
As we have seen previously, SQLi are still fearsome despite their age. If anyone has missed the basic information on SQLi I advise them to take a look at...
Read
What's happening in the Linux community: xz backdoor, trust attack!
Just three days ago, on March 29, 2024, a new attack was discovered: it affected open source software that is part of the main Linux packages, XZ...
Read
The risks of online exposure: the role of Open-Source Intelligence
The current world is increasingly oriented towards the digitalisation of assets, such as currencies, physical and intellectual properties, smart contracts and, more generally, data. The...
Read
“John The Ripper”
John The Ripper, not to be confused with "Jack the Ripper" (Jack the Ripper, so to speak) is an Open Source tool for auditing (controlling) password security and...
Read
AI and Cyber: what programming skills are needed?
As banal as it may seem, programming was born in response to the request to have machines perform tasks: humans needed a simple interface to...
Read
Security Summit 2024 is coming!
The main event of the cybersecurity panorama in Italy will be held in Milan between 19 and 21 March: the Security Summit. Organized over three days of conferences,...
Read
SQL Injection: always current despite its age
A few weeks ago I published an article entitled: "SQL Injection attack: what is it?", sincerely thinking of saying things that are known to everyone and without going too far...
Read

  
Cyber ​​and Artificial Intelligence in military applications
“The Russian-Ukrainian war, the Israeli conflict against Hamas” stated the Undersecretary of State for Defense...
Read
Cloudflare hacked: why and by whom?
News of the Cloudflare hack came out at the beginning of February. In the titles of the magazines we read...
Read
SQL Injection Attack: What is it?
How many times have you heard about SQL Injection and promised yourself to understand what it is, without then having...
Read
What is meant by Digital Forensics
In today's world we hear more and more often about cyber incidents, hackers and APT groups. In this context...
Read
The importance of data integrity
What is File Integrity Monitoring? What tools are used nowadays? Two questions that require...
Read
What is a Web Application Firewall
A Web Application Firewall, WAF for friends, is a security application that protects...
Read
How the AI ​​Act will regulate Artificial Intelligence in the EU and what impact it will have
“When the results are announced, Lee Sedol's eyes well up with tears. AlphaGo, an intelligence...
Read
Happy Cyber ​​2024
Last days of December, 2023 ends and usually it's time to take stock of the year that is coming to an end but I'm going...
Read
Eng. Davide Ariu (Pluribus One): "We need excellent software engineers"
As usual, we continue the series of interviews with Italian companies operating in the world of cyber and more...
Read
The FSB has been engaged in cyber attacks against the UK for years
The UK has accused the FSB of a long-running cyber hacking campaign. The British government accused the Russians of...
Read
National and Technological Security: reflections on the French ban on using WhatsApp
The French government's recent initiative to ban the use of WhatsApp and other foreign messaging apps by...
Read
Ing. Rustaggia (Revobyte): "we will be present in Rome with the 'Design your digital transformation' event on November 30th"
We continue our crusade aimed at spreading knowledge of the cyber world and new technologies in...
Read

Pages