Category Archives: Cybersecurity

Cyberattacks: a matter of war or disruption?

Cyberattacks: a matter of war or disruption?

Cyberattacks are a threat to national security. However, describing them as war is highly problematic. Critics of this stance often argue that armed conflict has been becoming virtual. They say that violence in post-modern conflicts has decreased, replaced by other forms of violence such as cyberattacks. However, war is a distinct activity with a particular nature. It is organized violence carried out by political units. Most cyberattacks are a type of non-military activity that falls under the broad banner of “strategy” or “grand strategy.” In other words, when sponsored by states, they may serve military activity as much as diplomacy does. Cyberspace is the fifth domain of conflict, entirely constructed […]

Smartworking: how to mitigate cyber risks

Smartworking: how to mitigate cyber risks

Smartworking is a  fertile ground for cyber threats and criminals. As steps to counter the coronavirus outbreak take effect, millions of workers across the globe have been sent home with their laptops many times. Cybercrime is a silent actor that attempts to exploit the vulnerabilities of remote working. Indeed, remote workers can potentially present a number of cybersecurity risks to organizations, and cybercriminals are finding more ways to exploit these weaknesses. With remote work, indeed, attack surfaces are be multiplied. As users we should not never let the guard down. A combination of procedures, tips, precautions, and training could mitigate risks to a great extent.   Read more on our […]

Cybercrime: how can we all deal with it?

Cybercrime: how can we all deal with it?

One of the biggest dilemmas in cybersecurity is the following: “Can we avoid cybercrime?” After all, online identity theft and fraud, hackers, ransomware cyber-attacks, phishing, and other scams are a threat to all of us. However, there is no Manichean answer to question. As businesses, leaders, individuals, entrepreneurs, and #security experts, we cannot stop cyber threats forever, even if united. Surely, prevention and mitigation may help in tackling cybercrime. As the Telsy family would say, indeed, “security is not the absence of threats, it’s the ability to detect them and take action before it’s too late”. Worldwide, the malicious activity of cybercriminals costs organizations and individual internet users billions every […]

VPN: a must-have tool for privacy and security

VPN: a must-have tool for privacy and security

VPN (Virtual Private Network) service gives you online privacy, anonymity, and security by creating a private network from a public internet connection. By using it, businesses can securely connect users and assets to intranet resources VPNs are also an effective shield from all threats coming from connections that do not require a password for access such as public WiFi networks you connect to while standing in line for a coffee or waiting to see your doctor. Eavesdroppers can watch your activity when connected to these insecure networks. Indeed, VPNs mask your IP address so your online actions are virtually untraceable. Moreover, they establish secure and encrypted connections to provide greater […]

SOC: what it is and how it operates

SOC: what it is and how it operates

SOC or Security Operations Center – not to be confused with SoC (“System on a Chip) – is the core component of a serious business security strategy. Simply put, a SOC assures threat detection and prevention in real time and makes sure that the protection of the data of clients and users is always optimal. As professionals, managers, entrepreneurs, and internet users, we are not completely aware that the threat of malicious actors is skyrocketing nowadays. As actual fact, cyberattacks are increasingly damaging organizations. Every year billions of people suffer from cyberattacks and data leaks, too. A SOC may be expensive and many organizations do not go beyond their IT […]

Anonymous: what to know about a worldwide hacking group

Anonymous: what to know about a worldwide hacking group

Anonymous is the most famous hacktivist group in the world. It gained international attention when it attacked the website of the Church of Scientology in 2008. As an informal group without a sanctioned hierarchy, it is difficult to explain what Anonymous is to the general public and to non-experts. The various hackers behind Anonymous worldwide are united in a belief that corporations and organizations they consider to be corrupt should be attacked. To do so, they use #DDoS attacks, as this is the most common method Anonymous uses to bring down the servers of their target. There is much more to talk about this group, however. Let’s us find out […]

Maze: a short story of one of the most dangerous cyberthreats

Maze: a short story of one of the most dangerous cyberthreats

The Maze group has been one of the subtlest hacking group in recent history. Maze was a hacking group targeting organizations worldwide across many industries. It has recently announced the stop of its activity. Maze had developed a ransomware which encrypts the data of the devices infected Security experts believe that Maze had operated via a black-hat hacking community. There, its developers had shared their proceeds with various groups that had deployed Maze in organizational networks. The damage made by Maze did not limit to violation of a given system, regrettably. Maze has proved  for taking advantage of assets in one network to move laterally to other networks. What made […]

Phishing: how to detect one of the subtlest online threats

Phishing: how to detect one of the subtlest online threats

Phishing is one the subtlest threats in the dark world of cyber threats. The world has been witnessing a surge in phishing attacks since the outbreak of the pandemic. It may be extremely disruptive and carry big security problems, but there are several ways to mitigate this threat. With a caveat: enhancing your cybersecurity through software  is essential, but it is not a silver bullet. Indeed, much depends on users’ behavior and threat actors know that. Let’s explore how, then! How to avoid phishing: identifying threats Scammers have increased their sophistication to induce victims into trap. Phishing emails and text messages may look like they’re from a company you know […]

Olicyber: the future of Italian cybersecurity is here!

Olicyber: the future of Italian cybersecurity is here!

Will the curriculum of Italian pupils soon include hacking? There is a chance. Italy is organizing its first CyberOlimpics, Olicyber, organised by CINI and TeamItaly, the Italian white hackers team. The organizing committee means to convey the value and the culture of cybersecurity among younger generations. Hopefully, this initiative will promote the selection and the  training of future and talented cybersecurity professionals. Olicyber: what is it? Disciplines of the Cyber Olympics include Web Security, Cryptography, Sofware Security, and Network Security. These special athletes are the pupils of Italian high-school. An additional merit of OliCyber is that the organizers will select the participants without discrimination, especially ensuring gender equality. Participation is […]

Cyberwarfare and national economies

Cyberwarfare and national economies

In the dark woods of cyber threats, cyberwarfare is not just as standard threat. It is much more serious than that. It is no secret that big and key strategic businesses are the targets of very sophisticated cyber threats. Many of them are, not surprisingly, state-sponsored. Indeed, such businesses lie at the crosshairs of governments, national intelligence agencies, and even terroristic groups. In this piece, we aim to investigate what are effects of cyberwarfare on national economies and how nations could protect themselves. Cyberwarfare: what is it? First, let’s define what cyberwarfare is. Cyberwarfare refers to those activities carried out by a nation-state or international organizations meant to damage the […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close