Tag Archives: Cyber Threat

Take a hacker seriously: the story of Raphael Grey

Take a hacker seriously: the story of Raphael Grey

You will take a hacker seriously after reading the story of Raphael Grey. Raphael Grey managed to hack several e-commerce sites, accessing the customers’ credit card data for a month in 2000 at the age of 18. This hack allowed him to steal several million dollars before he was arrested by the British police and the American FBI at his home in rural Wales on March 23, 2000. Prior to his arrest, Grey posted thousands of payment data on the web to highlight the inherent weaknesses of the e-commerce sites of the time. Today we explore the activities of the best known hackers in the history of computer science, known […]

AiR-ViBeR: the hack that exploits PC fans

AiR-ViBeR: the hack that exploits PC fans

Cyber ​​risks, as we know, have always been around the corner. They are insidious and can even silently affect the data of companies and individuals quite easily, if not adequately protected. Some threats are “louder” than others: Mordechai Guri, an Israeli researcher at Ben Gurion University of the Negev, managed to steal data from a PC, not connected to any network connection, by exploiting the vibration of the fans. The hack is called AiR-ViBeR and in order to work it needs to gain access to a PC and a second device that is in close proximity, such as a smartphone. But how does it work? The intrusion method is very […]

Cyber threats linked to COVID

Cyber threats linked to COVID

Has the Coronavirus had negative effects on the state of global cybersecurity? Unfortunately, yes. In the past few hours, there has been a series of cyber-attacks against the Italian pharmaceutical company IRBM, which produces the vaccine researched at the University of Oxford. In total, there were at least seven attacks, defined as “very violent” by the CEO Pietro di Lorenzo. The timing suggests a ‘political’ motive to undermine the position of a vaccine that is cheap and easy to transport: the attacks took place hours after the statement that made public the vaccine’s selling price. A worrying trend But it was not an isolated case. In recent days, we have […]

How the Italian Army defends itself from cyber threats: the RSC

How the Italian Army defends itself from cyber threats: the RSC

The Italian Army has recently made the Cyber ​​Security Department (RSC) operational, after establishing it around two years ago. As threats to cyber space increase exponentially, it is absolutely vital in this day and age to have a unit completely dedicated to the control and protection of all military networks and assistance in the various operational theaters at home and abroad. The Department will have mainly defensive tasks, aimed at intercepting cyber-attack attempts and securing all military devices and equipment connected to the network. Cyberwarfare is a pervasive reality within the international playing field and can have serious operational repercussions. A cyberattack directed at army communications systems can have dire […]

The double extortion technique: the Campari case

The double extortion technique: the Campari case

In recent weeks the Campari group has suffered a serious ransomware attack of the so-called “double extortion” technique. The damage would amount to two terabytes of stolen data, with attached the threat to publish it if the company does not pay $15 million. The attack and the reaction of the company The ransom was carried out by the Ragnar Locker criminal group that, using the same technique, struck Capcom about a month ago, threatening the publication or auctioning of data. The nature of the information stolen from Campari remains confidential, even if the well-known Italian company has admitted the possibility of a loss – not quantified – of personal data […]

Cybersecurity and the implementation of smart working

Cybersecurity and the implementation of smart working

Faced with the unexpected health crisis, institutions and companies around the world are trying to facilitate the implementation of smart working through the dispersion of adequate rules and procedures. The widespread training of people involved in teleworking is urgent if we are to avert the real risk of cyber-attacks, for profit or political destabilization, aimed at public, corporate or personal networks and systems. The introduction of digital devices in the workplace such as smartphones and tablets has undoubtedly increased productivity, while exposing companies to a greater risk of  cyber-attacks. A threat that is all the more tangible and probable the more time employees spend working on these devices, especially remotely. […]

Enisa report 2020: the pandemic’s effect on cybersecurity

Enisa report 2020: the pandemic’s effect on cybersecurity

Enisa (the European Union Agency for Cybersecurity) has recently published the eighth edition of its Threat Landscape Report (ETL) on cyber threats registered in the period between January 2019 and April 2020, describing the evolution of the current cybersecurity scenario in Europe and emphasizing in particular the serious effects of the Coronavirus pandemic on the sector. Overview of the Enisa 2020 report The new ETL-Enisa Threat Landscape 2020 report was produced with the support of the European Commission and EU Member States. The content of the ETL report is primarily based on literature available from open sources, such as articles, expert opinions, intelligence reports, security incident analysis and research reports, […]

Twitter attack: the three lessons to learn

Twitter attack: the three lessons to learn

The recent cyber-attack that hit Twitter has created a lot of media sensation, especially because it is the first time that one of the great global social media platforms has been compromised in such a vast and blatant way. Beyond the economic and image damage produced by the attack, this event must push us to make some broader considerations, starting from the implications for cybersecurity and privacy, up to the role that certain social networks have now assumed in the sphere of social and political life. The dynamics of the attack On July 15, 2020, between 8:00 PM and 10:00 PM UTC, several Twitter accounts of celebrities, each with millions […]

Ransomware: a threat to the present and the future

Ransomware: a threat to the present and the future

Ransomware has become an increasingly prominent threat to cyberspace security globally and the recent statistical data collected would seem to confirm this trend also for the years to come. What is ransomware and how it works The term “ransomware” refers to a type of malware that limits access to the device it infects, requiring a ransom to be paid to remove the limitation. Some forms of ransomware, for example, block the system and order the user to pay to unlock it, whereas others encrypt the user’s files instead, asking the user to pay a sum to make the files readable again. There are of course many variations of ransomware, but […]

Cyber war: the current scenario

Cyber war: the current scenario

The modern hybrid war Lately we hear more and more often about “hybrid” or “asymmetric” war, terms intended to explain a military strategy that mixes conventional war, irregular war and cyber war with other indirect attack methods, such as fake news and accusations in the legal or political field. With the evolution of hybrid war as a form of low intensity conflict during peacetime, the “battlefield” has therefore expanded to sectors and organizations that had never been involved in war before. In fact, today, world superpowers are often involved in low intensity conflicts that allow the forces involved to avoid getting caught up in traditional confrontation. The last front of […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close