Is the M1A2 Abrams cyber protected?
Let's keep it simple: Vehicles are susceptible to cyber attacks. If you think of a modern vehicle you will realize that it is nothing more than a handful of computers on wheels or ...
Read
Does NATO need a Cyber ​​Command?
The security environment defined by NATO in the "Strategic Concept" document of 2010, already underlined that the level of the threat in the cyber sector was high for both ...
Read
The new digital revolution, deep learning
Recognize a photo, a song, a user's habit. With artificial intelligence it is already possible. But why does it matter, and how is it affecting the way we ...
Read
A subtle threat to be countered with "attention"!
Some time ago I read about the increase in cases of "vishing": the theft of credentials implemented through a pretext phone call in which an impostor (or an answering machine ...
Read
West Point Strategic Concept Seminar: in February we begin to answer the many questions
In a few days the awaited "West Point Strategic Concept Seminar" will be held organized by the Social Sciences Research Lab, led by the director, Lieutenant Colonel Jordan Becker ...
Read
WPScan: web security scanner for WorpPress
WordPress is an Open Source CMS (Content management system) software, i.e. a platform that allows you to create and manage a website and its contents in a simple and ...
Read
Nation State Threat Actors: Intelligence Services at the forefront of the next war
NATO has repeatedly reiterated that "a cyber attack targeting a nation is an aggression to all member countries". Article 5 of the Atlantic Alliance which enshrines the right ...
Read
Not just IT protection
Verkada, Triton, Colonial Pipeline ... they are not mysterious words of a quiz game, but simply the mirror of the reality we are facing in which is the boundary between ...
Read

  
Google Dorks, these strangers ...
Google Dork is an advanced search technique that can help uncover hidden data from the Google search engine ...
Read
The value of eXpanded Detection and Response
In CyberSecurity, what does eXpanded Detection and Response (XDR) mean? What features does an XDR system have? How can...
Read
Alexa, Artificial Intelligence and Common Sense
You might be wondering what "common sense" means, perhaps looking for a definition in the Treccani dictionary, from which you ...
Read
Deepfakes: the art of creating "fake authors" at the time of artificial intelligence
In recent years, the development and implementation of deep neural networks has ...
Read
Vulnerability ALARM: CVE-2021-44228, "Apache Zero-Day Log4j" for friends!
Once again the world of computer technology is shocked by the discovery of a vulnerability distributed on ...
Read
CyberSecurity and Health
Cyber ​​attacks on healthcare infrastructures are intensifying in number and quality and increasingly ...
Read
Fighting the bad guys in a structured way
The world of technology, more particularly that of cyber security, is today full of acronyms and acronyms that make ...
Read
Ethical Biohacking and Supply Chain
Since I was a boy I have been intrigued by Bioengineering so much that it has become the specialization of my path ...
Read
With SICYNT 250 children are more cyber-safe
December 7, 2021, 6.40 AM, somewhere near a Milan that for the most part still sleeps, considering that it is the ...
Read
Smart Working and Cybersecurity
Smart Working, a very popular term in the last year and a half, is the new way of working that involves different ...
Read
NATO Strategic Concept: the renewal process begins
Is the security context defined in November 2010 in the NATO Strategic Concept document still valid? Which...
Read
Keraunos: the interception-proof satellite link
"One of the projects that will contribute to the superiority of our armed forces". This is what the minister said ...
Read

Pages