Vaccines and dark web
COVID 19 has affected our lives over the past 18 months by forcing us to change our social life habits. From the banal handshake, now gone, to ...
Read
"Networking" to defend the "network": the MITER ATT & CK case
As mentioned in my previous article, any hacker has an "operational attack profile", recognizable by observing his Tactics, Techniques and Procedures ...
Read
The attack on the TOR infrastructure - Cryptocurrencies the real target
When it comes to anonymity on the web and browsing the Dark Web, Tor is often referred to. In the common imagination, Tor is seen as both an Internet communication method for ...
Read
Know the opponent's cyber tactics
Any IT security and cyber protection activity is based on the determination of a border to be guarded (the security perimeter) and on the ...
Read
Venticento: a Made-in-Italy excellence in IT security
In other articles we have already dealt with the SOC (Security Operation Center) defining it as a complex organizational unit, generally centralized, which deals with ...
Read
How vulnerable is the US energy infrastructure?
This is what Americans are discovering these days. Sure, it's not the first time this has happened, but it's probably the first time a problem of this size has happened. There...
Read
The rise of cyber crime
It might sound like a movie title, but it's not. It is much more simply a trivial reality! Every day the news about hacker attacks, carried out in ...
Read
l CISCO Co-Innovation Center in Milan one year after its opening
In January 2020, the Cisco Cybersecurity Co-Innovation Center opened in Milan, within the structure of the Science Museum, the first in Europe. A little more than ...
Read
Locked Shields: the largest cyber tutorial in the world. This year Sweden wins
Also this year, between 13 and 16 April, the cyber exercise Locked Shields was held. Like every year ...
Read
Facebook Data Public Disclosure and the disturbing feeling of addiction to the data breach
Technology is no exception, as every other area of ​​society has its own hot topics and some words ...
Read
The Quantum-Secure Net project (part 3/3): European product of QUANTUM KEY DISTRIBUTION
The following is the third and final part of the series of articles on quantum cryptography, which began with the two ...
Read
What is the cyber kill chain?
In several articles we have mentioned the so-called "cyber kill chain" but on closer inspection we never really ...
Read
Whaling: what it is and what are the risks
In recent years, cyber attacks have evolved, changing shape and intensity. The global health crisis has ...
Read
The SolarWinds case, let's take stock
In an article from December 14, 2020, we talked about FireEye and how it was hacked. It was the same company ...
Read
The cyber national security perimeter: a new challenge for general counsel and compliance officers
In the difficult moment of reconstruction that will follow the great economic crisis caused by the pandemic, one of the assets ...
Read
The Quantum-Secure Net project (part 2/3): European product of Quantum Key Distribution
In the first article we introduced what are the main problems of modern cryptography, or rather, what ...
Read
TryHackMe: cyber and gamification
Some time ago I told you about the Ares project, an online platform developed according to the concept of ...
Read
Microsoft: security and privacy at the time of Covid
A few months ago we talked about the importance of security and privacy at the time of COVID (see article) ...
Read
CyberChallenge.it, the 2021 edition at the starting blocks
CyberChallenge.it is one of the many answers that Italy is giving (together with new degree courses, ...
Read
The Quantum-Secure Net Project (part 1/3): The quantum threat to modern cryptography
This article is divided into three parts, and aims to retrace the main elements of cryptography and ...
Read

Pages