Attacks against Active Directory ? Also, but not only...
Reading while reading I came across a really interesting infographics. I must admit that infographics appeal to me for their ability to represent concepts in…
Read
Artificial Intelligence in the Social Era
Artificial Intelligence (AI) is a discipline in the field of information technology that aims to create systems and machines capable of performing tasks that typically require the ...
Read
Interview with Enrico Ingenito (PWNX): “From Zero To Hero”
What is PWNX? If you browse the Internet (https://pwnx.io/) you come across a site that talks about: challenges, games, red, blue and purple... But what do these refer to...
Read
Crypto Wallets: What are they and which are the safest?
Recently, a feature advertised by Ledger, a well-known manufacturer of connected hardware wallets, has caused quite a stir, which would allow the extraction of the seed for...
Read
Second SICYNT annual meeting
The second annual SICYNT meeting was held on Saturday 20 May at the CISCO headquarters in Rome. SICYNT is an Italian association born with the aim of...
Read
The cyber security department and the Army cyber protection brigade train jointly
The exercise conducted as part of bilateral activities with allied countries, between the Cyber ​​Security Department (RSC) and the specialists of the Cyber ​​Army has ended...
Read
The CHIRONEX 23-1, the first cyber exercise of the Navy, has ended
CHIRONEX 23-1, the first cyber exercise for the Navy, ended this morning on board the Cavour aircraft carrier in the Open Sea area 23-1. The undersecretary of state...
Read
Link with the Forum International de la Cybersécurité in Lille
The Forum Internacional de la Cybersécurité (FIC) is underway in Lille, France. French and international companies present the latest news and address issues concerning the...
Read

  
Windows vs Linux
The article I am about to write wants to emphasize some aspect of two different visions and at the same time...
Read
CyberSec2023: also Defense on the front line
On March 2023, XNUMX, Luigi Garofalo, director of Cybersecurity Italy, launched the second edition of...
Read
Innovation: on the edge of reality with Robots that change their state of matter
Some time ago, for science fiction lovers, films called "Terminator" were released in which a robot was capable...
Read
How phishing campaigns are performed and what data is useful for attackers
Part of my job is to test the human element of security in organizations by building and launching...
Read
ChatGPT: an instructive chat with an Artificial Intelligence
Surely in the last few weeks you have heard of ChatGPT, a chat that makes use of Artificial Intelligence...
Read
EU and project funding (cyber)
Knowledge is the basis of everything! Who knows how many times you've heard that. Yet, although the concept is…
Read
Quantum Threat: Challenge to modern cryptographic systems
In recent months, the world of cryptography has been shaken by two announcements: the White House has issued a memorandum…
Read
NATO and Cognitive Warfare
We have already talked about Cognitive Warfare and the importance of what in some circles is considered...
Read
Knowledge Management and technology
As always happens, there comes a time when something needs to change, in life as in work or in society. ...
Read
From Information Warfare to Cognitive Warfare
Those who follow the evolution of the military field will not have missed that after Cyber ​​Warfare, Information Warfare and...
Read
Lockheed Martin and Microsoft, classified cloud and new technologies for American defense
A few days ago the announcement was made that the two giants, Lockeed Martin and Microsoft, have decided to enter into an alliance...
Read
Browser fingerprint, with all due respect to privacy!
I think everyone knows what a browser is, so I take it for granted and ask instead if you know what a browser is ...
Read

Pages