
03/02/25 | Cyber
DNS Tunneling: An Invisible Threat That Passes Through Corporate Networks
In the context of cybersecurity, monitoring and defending against threats from network traffic is crucial to protecting corporate infrastructure and...
416
Read

28/01/25 | Cyber
DeepSeek R1: China's Strategic Advance in Open Source AI and the Implications for the Global Tech Balance
In a geopolitical context characterized by growing technological tensions between East and West, China with Liang Wenfeng has launched DeepSeek R1, an intelligence model...
1110
Read

24/01/25 | Cyber
Virus = Malware? Like calling every insect a "mosquito"!
In the world of cybersecurity, the terms “virus” and “malware” are often used interchangeably, but this confusion is especially common among newbies and those who are unfamiliar with...
295
Read

19/01/25 | Cyber
Spying and Logic Bombs: China and the US Await Trump in Cyberspace
In an interview with Bloomberg, National Security Advisor Jake Sullivan reiterated once again the importance of the Chinese cyber threat to security...
273
Read

16/01/25 | Cyber
Cybersecurity: IEC62443 and the “Security Level” approach
As we saw in my previous article, RAT theory identifies how attacker motivation is an important element in assessing threats and how it is...
241
Read

12/01/25 | Cyber
Hacking and Propaganda: Italy Under Attack Between Cyber Threats and Psychological Warfare
Two days and two waves of cyber attacks have targeted Italian institutional websites and those of Italian banks, companies and ports. It is not the first time that this has happened, go...
4853
Read

16/12/24 | Cyber
Steganography: The Ancient Art of Secret Communication and Its Evolution in the Digital Age
Steganography, often considered the poor cousin of cryptography, can be defined as "the art and science of hiding information so that its simple...
549
Read

11/12/24 | Cyber
KINAITICS: A European project to improve the cybersecurity of control systems equipped with artificial intelligence
If we carefully observe some phenomena related to the use of digital technologies, we can notice that the exposure of IT (Information Technology) and OT systems on cyberspace...
227
Read

09/12/24 | Cyber
ACN-CyEX24 Exercise Completed: A Step Forward for National Cybersecurity
The ACN-CyEX24 exercise, the first of its kind, has concluded at the headquarters of the National Cybersecurity Agency (ACN).
228
Read

02/12/24 | Cyber
Pyongyang's Dagger: North Korea and Cyberspace
Described by Kim Jong-un as a "dagger ready to strike relentlessly" at the nation's enemies1, the cyber force...
1731
Read

12/11/24 | Cyber
The Application of International Humanitarian Law to Cyber Warfare: Still Interpretative Differences
Regarding new technologies and International Humanitarian Law, there are four issues that continue to...
283
Read

08/11/24 | Cyber
CyberTech Europe 2024: interview with CrowdStrike
Cybertech Europe 2024, one of the most anticipated and important events for cybersecurity in Europe, an event that attracts...
158
Read

06/11/24 | Cyber
The Other Side of Cybersecurity: The OT World
When we talk about cybersecurity, we immediately think of the protection of personal data, the protection of privacy, the...
326
Read

04/11/24 | Cyber
What is Cyberspace?
The term “cyberspace” is ubiquitous in the context of cybersecurity, communications, and even...
431
Read

23/10/24 | Cyber
Personal data, the world of work and the impact on markets: the revolution of artificial intelligence and virtual reality
The new digital economy passes through the challenges of big-tech, between generative artificial intelligence and reality...
231
Read

18/10/24 | Cyber
Sicynt and Difesa Online together at Cyber Tech Europe 2024: let's visit the stands
One of the most important events in Italy and at European level in the field of cybersecurity and technologies...
481
Read

15/10/24 | Cyber
Cybertech Europe 2024: Interview with Sujoy Banerjee, Associate Director of ManageEngine
Thanks to the collaboration between Sicynt and Difesa Online we participated in Cybertech Europe 2024 in Rome. Cybertech...
173
Read

11/10/24 | Cyber
Cybertech Europe 2024: Interview with Trend Micro
Thanks to the collaboration between SICYNT and Difesa Online, we participated in the 2024 edition of Cybertech Europe,...
309
Read

30/09/24 | Cyber
The Black Market of Artificial Intelligence. Here are the "MALLA"!
The evolution of artificial intelligence has led to significant progress in various sectors but has also opened the...
1953
Read

26/09/24 | Cyber
"DGA: The Invisible Code" (How Malware Eludes Detection)
Domain Generation Algorithm (DGA) is a technique used by cybercriminals to automatically create a...
806
Read