22/08/24 | Cyber
Artificial Intelligence: the Cybersecurity revolution
Artificial intelligence (AI) is revolutionizing cybersecurity, bringing a series of innovations that fundamentally change the way we protect our systems and data...
510
Read
14/08/24 | Cyber
Bugs, Vulnerabilities, Exploits: the conditions for a compromise
The last year has seen the appearance of software issues affecting extremely popular operating systems and software libraries. Problems with effects...
166
Read
30/07/24 | Cyber
Cybersecurity guides: the triad
Anyone approaching the world of cybersecurity will soon hear about the triad. This is not the infamous Chinese mafia but three related concepts that...
332
Read
15/07/24 | Cyber
Interview with Marco Rottigni: The genesis of Zelda
Hi Marco, to begin with I would like to congratulate you on your third novel as well as your first solo, so to speak: The Genesis of Zelda. We have known each other for some...
274
Read
04/07/24 | Cyber
Databases, information, knowledge
Ever since man began to systematize knowledge, he has had the need to classify and define the surrounding reality. To do this he introduced methods ...
576
Read
24/06/24 | Cyber
Do you already know Ransomfeed?
New online services are created every day, often these are already existing services that are re-proposed in digital form on the web. Sometimes these are services of...
585
Read
20/06/24 | Cyber
Retired General Paul M. Nakasone appointed to OpenAI Board of Directors
On June 13, OpenAI announced the addition of retired General Paul M. Nakasone to its Board of Directors. According to OpenAI leaders, the general's presence on the Board of Directors brings experience in...
869
Read
14/06/24 | Cyber
What is Cybersecurity? An introductory guide
We hear more and more about cybersecurity, but how many are able to say what it really is? Let's try to understand it together. It seems trivial but giving a...
521
Read
11/06/24 | Cyber
OWASP Day & Cyber Journey
When we talk about cyber security we always think of bad computer pirates and those who, on the other side of the...
160
Read
06/06/24 | Cyber
Use of 5G mobile data networks in tactical areas
Tactical communications are military communications in which information, particularly orders and intelligence...
508
Read
22/05/24 | Cyber
The G7 Cyber working group meets in Italy
Born in 2015 to give continuity to work on cyber policies and strategies for the financial world among...
191
Read
13/05/24 | Cyber
18 May 2024: Sicynt event in Rome
On May 18, 2024, in Rome, at the Cisco headquarters in via del Serafico, the annual meeting of SICYNT will be held -...
259
Read
09/05/24 | Cyber
ENISA and Cybersecurity "skill shortage"
According to what is reported in the Western media, digital society is going through a period of strong growth and...
373
Read
06/05/24 | Cyber
“Metasploit”: all the exploits for the price of one
What would you think if I told you that there is a tool that brings together the most popular vulnerability techniques...
297
Read
29/04/24 | Cyber
XXE injection attack: what it is and how to prevent it
When we talk about XXE injection we are referring to a very widespread web vulnerability that allows a hacker to...
395
Read
19/04/24 | Cyber
Biden establishes the figure of CAIO (Chief Artificial Intelligence Officer)
Last March 28, Memorandum M-24-10 was issued, the subject of which is: "Advancing Governance, Innovation, and Risk...
813
Read
11/04/24 | Cyber
The XSS threat and the role of the WAF
Among the cyber attacks that exploit script injection methodologies, Cross Site Scripting (XSS) is certainly...
365
Read
05/04/24 | Cyber
How to trick defenses to do a SQL attack with JSON
As we have seen previously, SQLi are still fearsome despite their age. If anyone missed the...
343
Read
02/04/24 | Cyber
What's happening in the Linux community: xz backdoor, trust attack!
Just three days ago, on March 29, 2024, a new attack was discovered: it affected open source software that...
1992
Read
02/04/24 | Cyber
The risks of online exposure: the role of Open-Source Intelligence
The current world is increasingly oriented towards the digitalization of assets, such as currencies, physical properties and...
914
Read