Tag Archives: Cyber Security

Cyberattacks: a matter of war or disruption?

Cyberattacks: a matter of war or disruption?

Cyberattacks are a threat to national security. However, describing them as war is highly problematic. Critics of this stance often argue that armed conflict has been becoming virtual. They say that violence in post-modern conflicts has decreased, replaced by other forms of violence such as cyberattacks. However, war is a distinct activity with a particular nature. It is organized violence carried out by political units. Most cyberattacks are a type of non-military activity that falls under the broad banner of “strategy” or “grand strategy.” In other words, when sponsored by states, they may serve military activity as much as diplomacy does. Cyberspace is the fifth domain of conflict, entirely constructed […]

Erecting an IT fortress: strategies for resilience

Erecting an IT fortress: strategies for resilience

Erecting an IT fortress is an urgent need these days. Facing the surge in cyber-attacks of these times, companies will need to adopt new strategies, procedures and technologies to become more resilient to the onslaught of cybercrimes. The pandemic has shown how vulnerable many organizations are to organized malicious actors. Meanwhile, the increasing weight of digital transformation has increased the number and the extent of disruption that could occur. Indeed, being IT-resilient means keeping to a minimum any type of disruption and downtime and ensuring service continuity. Looking for an increased resilience, IT teams are re-evaluating their shortcomings and processes when it comes to building their organizations’ security infrastructure. Approaches […]

VPN: a must-have tool for privacy and security

VPN: a must-have tool for privacy and security

VPN (Virtual Private Network) service gives you online privacy, anonymity, and security by creating a private network from a public internet connection. By using it, businesses can securely connect users and assets to intranet resources VPNs are also an effective shield from all threats coming from connections that do not require a password for access such as public WiFi networks you connect to while standing in line for a coffee or waiting to see your doctor. Eavesdroppers can watch your activity when connected to these insecure networks. Indeed, VPNs mask your IP address so your online actions are virtually untraceable. Moreover, they establish secure and encrypted connections to provide greater […]

SOC: what it is and how it operates

SOC: what it is and how it operates

SOC or Security Operations Center – not to be confused with SoC (“System on a Chip) – is the core component of a serious business security strategy. Simply put, a SOC assures threat detection and prevention in real time and makes sure that the protection of the data of clients and users is always optimal. As professionals, managers, entrepreneurs, and internet users, we are not completely aware that the threat of malicious actors is skyrocketing nowadays. As actual fact, cyberattacks are increasingly damaging organizations. Every year billions of people suffer from cyberattacks and data leaks, too. A SOC may be expensive and many organizations do not go beyond their IT […]

Maze: a short story of one of the most dangerous cyberthreats

Maze: a short story of one of the most dangerous cyberthreats

The Maze group has been one of the subtlest hacking group in recent history. Maze was a hacking group targeting organizations worldwide across many industries. It has recently announced the stop of its activity. Maze had developed a ransomware which encrypts the data of the devices infected Security experts believe that Maze had operated via a black-hat hacking community. There, its developers had shared their proceeds with various groups that had deployed Maze in organizational networks. The damage made by Maze did not limit to violation of a given system, regrettably. Maze has proved  for taking advantage of assets in one network to move laterally to other networks. What made […]

Olicyber: the future of Italian cybersecurity is here!

Olicyber: the future of Italian cybersecurity is here!

Will the curriculum of Italian pupils soon include hacking? There is a chance. Italy is organizing its first CyberOlimpics, Olicyber, organised by CINI and TeamItaly, the Italian white hackers team. The organizing committee means to convey the value and the culture of cybersecurity among younger generations. Hopefully, this initiative will promote the selection and the  training of future and talented cybersecurity professionals. Olicyber: what is it? Disciplines of the Cyber Olympics include Web Security, Cryptography, Sofware Security, and Network Security. These special athletes are the pupils of Italian high-school. An additional merit of OliCyber is that the organizers will select the participants without discrimination, especially ensuring gender equality. Participation is […]

Kevin Mitnick: the computer-break-in artist

Kevin Mitnick: the computer-break-in artist

Kevin Mitnick was the most elusive computer break-in artist in history. Security experts often refer to him as the “The World’s Most Wanted Hacker”. Indeed, the US Feds took almost three years to catch him. How he did managed to do that? Let’s explore his story, then! Hacking activity Grown up in Los Angeles, Mitnick wanted to become a magician. When he learned how to make phone calls with a little blue box, he became curious about comms. This also included how phone systems work and ultimately hacked phone companies systems to learn more. Hacking into corporate networks and stealing data landed the teenager in jail. Indeed, he stole computer handbooks […]

Turin Polytechnic under attack: what you should know

Turin Polytechnic under attack: what you should know

A hacker attack has temporarily disabled online services servers of the Turin Polytechnic for a few hours. What did happen? Was it a severe violation? Let’s find it out together! What did happen? A series of cyber attacked hit the Turin Polytechnic authentication servers from several computers spread in the world on the evening 7th January 2021. The first intrusion attempt caused the halting of online authentication servers for about 15 minutes. Hackers tried again at 10 am the following day targeting the app system of the Turin Polytechnic. They used a DDoS attack with the SYNFlood technique. At 10:50 am intruders targeted the network gate of the app system. […]

Emotet infrastracture has been disrupted in Europe

Emotet infrastracture has been disrupted in Europe

Law enforcement agencies from the several EU countries and the UK have dismantled the notorious malware Emotet. The takedown of this malicious botnet happened on Tuesday, 26th January. Emotet is a computer malware program that was originally developed in the form of a banking Trojan. Its main goal was to access devices as well as spy on sensitive private data. As threat, it was particularly sneaky. It has been known to deceive basic antivirus programs and hide from them. Finally, Emotet gained popularity in the cybercrime universe for its modular architecture. Modularity makes it tailorable for every environment it targets. Let’s discover more below. The Emotet threat Experts have labelled […]

Sunburst: the attack that shook the world

Sunburst: the attack that shook the world

Cyber analysts recently discovered the “Sunburst” attack malware, which triggered a series of cyber-espionage attacks that began in the spring of 2020. The attack involved thousands of public administrations, private organizations and individuals on a global scale. American investigators have been pointing fingers at Russian-sponsored hackers. US authorities have labelled it as the most severe cyberattack against public and private bodies alike in the United States and believe that the origin of the threat are Russia-sponsored hackers. How did the Sunburst attack happen? What happened exactly? Let’s explore which intrusion technique hackers employed in this case. First, hackers implanted a malware in the software update of a platform installed in […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close