Sunburst: a Pearl Harbor Cyber?
In a few years, when the current terrible pandemic is finally under control, 2020 will not be remembered only for the explosion of the COVID-19 infection and its ...
Read
FireEye hacked, by whom?
The US company FireEye, cyber security giant, recently reported having been the victim of hackers, probably supported by a state. Let's remember ...
Read
Little Red Riding Hood and Climbing Beyond the Cloud (How to Become a Hacker)
"Once upon a time there was the real world ..." In a hundred years with this premise we will tell a story to make our great-great grandchildren go to bed. We will start by talking about a dessert ...
Read
Quantum Supremacy to China?
We have long been talking about the evolution of quantum technology applied to computers and cryptographic algorithms. Three years ago we spoke in a ...
Read
Cloud and Confidential Computing ...
For years, cybersecurity experts from private companies and public organizations have been faced with the innovative thrust of new services, generically identified ...
Read
Microsoft Pluton, for a safer world
A few days ago Microsoft presented its latest novelty to the world: Microsoft Pluton. Announced in collaboration with leading Silicon processor manufacturers ...
Read
Cyber: has Russia attacked Norway?
Cyberspace is increasingly a territory of conflict, it is now possible to realize it every day, it is no longer talked about only in professional forums but has become a topic for ...
Read
Project Ares: cyber and gamification
Research in the cyber field is increasingly pushed and touches all aspects of the fifth domain. Training is one of the most important. Being able to train staff in short ...
Read

rheinmetal defense
American elections: Trump's website hacked
We are in time of American elections, in a few days it will be known who will lead the first world power and, of ...
Read
The TIDoS Framework
For Kaly Linux lovers, Metasploit is the framework used to perform Penetration Testing activities ... In the ...
Read
Botnets: one of the biggest threats in cyberspace
Cybersecurity is a shared responsibility, which affects us all. We must start from this assumption of ...
Read
Cyber ​​US-Russia truce ... what if it goes through operations against Trickbot?
According to the Washington Post, the US Cyber ​​Command in recent days has been engaged in an operation ...
Read
Microsoft - the importance of security and privacy in the time of Covid
“Microsoft's goal is to democratize access to technology so that everyone can benefit from it, ...
Read
The United States first in the world in the cyber field
This, in summary, is what is stated in the National Cyber ​​Power Index (NCPI) 2020 of the Belfer Center for Science and ...
Read
The Chief Information Security Officer, what skills?
For many cybersecurity professionals the ultimate career goal is to take on the role of ...
Read
INTEL launches the new generation of Tiger Lake processors
On September XNUMX, Intel announced the release on the market of the new generation of processors, the eleventh, ...
Read
How to compete in Cyberspace: the new approach
On 25 August 2020, on Foreign Affairs, a very interesting article was published, signed Nakasone and Sulmeyer ....
Read
Trickbot: the most widespread trojan in COVID 19 campaigns
Trickbot malware belongs to the family of spyware Trojans, mainly used against industry targets ...
Read
The new frontiers of Cyber ​​Security
Companies, public institutions and even individual citizens could pay dearly for the technological revolution ...
Read
Artificial Intelligence for the conversion between programming languages
We are no longer surprised when we hear about Artificial Intelligence, as Alan Turing had predicted by now ...
Read

Pages