"My mission is to strengthen the capabilities of our Armed Forces in guaranteeing the protection of the country system in the cybernetic domain and, consequently, in making them effective in their reactions to possible threats or attacks. After the first six months of taking up my position, I have realized the quality and the competence from which we start, but there is still a lot to do to improve the organization and make it really efficient and reactive in a domain, which is the cybernetic one, traveling at very high speeds ", said Undersecretary of State for Defense Angelo Tofalo, with specific proxy cyber, who this morning, in Milan, introduced the works of the 9na Edition National Cyber Warfare Conference, entitled "From passive defense to active response - Effectiveness and legitimacy of the active response to cyber threats".
Cyber: Undersecretary Tofalo, strengthen Armed Forces capacity to protect the country system in the cybernetic domain
(To Massimiliano Rizzo)
12/12/18
337
06/05/24 | Cyber
“Metasploit”: all the exploits for the price of one
What would you think if I told you that there is a tool that brings together the most popular vulnerability techniques...
176
Read
29/04/24 | Cyber
XXE injection attack: what it is and how to prevent it
When we talk about XXE injection we are referring to a very widespread web vulnerability that allows a hacker to...
285
Read
19/04/24 | Cyber
Biden establishes the figure of CAIO (Chief Artificial Intelligence Officer)
Last March 28, Memorandum M-24-10 was issued, the subject of which is: "Advancing Governance, Innovation, and Risk...
712
Read
11/04/24 | Cyber
The XSS threat and the role of the WAF
Among the cyber attacks that exploit script injection methodologies, Cross Site Scripting (XSS) is certainly...
325
Read
05/04/24 | Cyber
How to trick defenses to do a SQL attack with JSON
As we have seen previously, SQLi are still fearsome despite their age. If anyone missed the...
306
Read
02/04/24 | Cyber
What's happening in the Linux community: xz backdoor, trust attack!
Just three days ago, on March 29, 2024, a new attack was discovered: it affected open source software that...
1640
Read
02/04/24 | Cyber
The risks of online exposure: the role of Open-Source Intelligence
The current world is increasingly oriented towards the digitalization of assets, such as currencies, physical properties and...
867
Read
25/03/24 | Cyber
“John The Ripper”
John The Ripper, not to be confused with “Jack the Ripper” (Jack the Ripper, so to speak) is an Open instrument...
970
Read
19/03/24 | Cyber
AI and Cyber: what programming skills are needed?
As banal as it may seem, programming was born in response to the request to have tasks performed by...
554
Read
13/03/24 | Cyber
Security Summit 2024 is coming!
The main event of the cybersecurity panorama in Italy will be held in Milan between 19 and 21 March: Security...
177
Read
Events
Click on the days highlighted in red and find out what's in evidence.
Tribute (due) to the 80th "Roma" infantry who takes leave with honor
Well, yes, we are now used to witnessing the closure of the barracks and perhaps even a little to burying the long history of the departments, a phenomenon which however does not erase the memories. It also touched...
"Il Signor Parolini" (ninth part)
The baked chicken, as expected, had lived up to its reputation, consolidating, where needed, the undisputed culinary mastery of Gastone, chief ...