Nation State Threat Actors: Intelligence Services at the forefront of the next war
NATO has repeatedly reiterated that "a cyber attack targeting a nation is an aggression to all member countries". Article 5 of the Atlantic Alliance which enshrines the right ...
Read
Not just IT protection
Verkada, Triton, Colonial Pipeline ... they are not mysterious words of a quiz game, but simply the mirror of the reality we are facing in which is the boundary between ...
Read
Google Dorks, these strangers ...
Google Dork is an advanced search technique that can help uncover hidden data from the Google search engine. Some people call them "Google commands" or a ...
Read
The value of eXpanded Detection and Response
In CyberSecurity, what does eXpanded Detection and Response (XDR) mean? What features does an XDR system have? How can it help someone who has been hit by an attack? CyberSecurity ...
Read
Alexa, Artificial Intelligence and Common Sense
One might wonder what "common sense" means, perhaps looking for a definition in the Treccani dictionary, from which one would have: "Natural, instinctive ability to judge ...
Read
Deepfakes: the art of creating "fake authors" at the time of artificial intelligence
In recent years, the development and implementation of deep neural networks has accelerated the development of applications capable of recognizing in ...
Read
Vulnerability ALARM: CVE-2021-44228, "Apache Zero-Day Log4j" for friends!
Once again the world of computer technology is shocked by the discovery of a vulnerability spread across a huge amount of computer systems, according to some ...
Read
CyberSecurity and Health
Cyber ​​attacks on healthcare infrastructures are intensifying in number and quality and are increasingly successful, bringing to the fore the need for ...
Read
Fighting the bad guys in a structured way
The world of technology, more particularly that of cyber security, is today full of acronyms and acronyms that make ...
Read
Ethical Biohacking and Supply Chain
Since I was a boy I have been intrigued by Bioengineering so much that it has become the specialization of my path ...
Read
With SICYNT 250 children are more cyber-safe
December 7, 2021, 6.40 AM, somewhere near a Milan that for the most part still sleeps, considering that it is the ...
Read
Smart Working and Cybersecurity
Smart Working, a very popular term in the last year and a half, is the new way of working that involves different ...
Read
NATO Strategic Concept: the renewal process begins
Is the security context defined in November 2010 in the NATO Strategic Concept document still valid? Which...
Read
Keraunos: the interception-proof satellite link
"One of the projects that will contribute to the superiority of our armed forces". This is what the minister said ...
Read
Cyber ​​Deterrence: UK and India fight together. Italy?
Today's war, the one that is fought with no holds barred in cyberspace (or through it), has not been won since ...
Read
Near Field Communication: the cyber threat we carry in our pockets
As part of the prevention of attacks on industrial information assets carried out during a ...
Read
The Smishing, this unknown
Black Friday is approaching, a commercial event of American origin but which due to globalization ...
Read
Trojan Source Attack, what is it?
How about if it were possible to trick compilers into producing binaries other than logic ...
Read
Cybercriminals vs Pirates
We live in really interesting times: exactly ten years ago the US Department of Defense defined the domain ...
Read
Network systems automation techniques
The reference to the use of automation techniques and possibly AI (Artificial Intelligence) has become ...
Read

Pages