Tag Archives: Cyber Threat

Smartworking: how to mitigate cyber risks

Smartworking: how to mitigate cyber risks

Smartworking is a  fertile ground for cyber threats and criminals. As steps to counter the coronavirus outbreak take effect, millions of workers across the globe have been sent home with their laptops many times. Cybercrime is a silent actor that attempts to exploit the vulnerabilities of remote working. Indeed, remote workers can potentially present a number of cybersecurity risks to organizations, and cybercriminals are finding more ways to exploit these weaknesses. With remote work, indeed, attack surfaces are be multiplied. As users we should not never let the guard down. A combination of procedures, tips, precautions, and training could mitigate risks to a great extent.   Read more on our […]

Cyberwarfare and national economies

Cyberwarfare and national economies

In the dark woods of cyber threats, cyberwarfare is not just as standard threat. It is much more serious than that. It is no secret that big and key strategic businesses are the targets of very sophisticated cyber threats. Many of them are, not surprisingly, state-sponsored. Indeed, such businesses lie at the crosshairs of governments, national intelligence agencies, and even terroristic groups. In this piece, we aim to investigate what are effects of cyberwarfare on national economies and how nations could protect themselves. Cyberwarfare: what is it? First, let’s define what cyberwarfare is. Cyberwarfare refers to those activities carried out by a nation-state or international organizations meant to damage the […]

Kevin Mitnick: the computer-break-in artist

Kevin Mitnick: the computer-break-in artist

Kevin Mitnick was the most elusive computer break-in artist in history. Security experts often refer to him as the “The World’s Most Wanted Hacker”. Indeed, the US Feds took almost three years to catch him. How he did managed to do that? Let’s explore his story, then! Hacking activity Grown up in Los Angeles, Mitnick wanted to become a magician. When he learned how to make phone calls with a little blue box, he became curious about comms. This also included how phone systems work and ultimately hacked phone companies systems to learn more. Hacking into corporate networks and stealing data landed the teenager in jail. Indeed, he stole computer handbooks […]

Turin Polytechnic under attack: what you should know

Turin Polytechnic under attack: what you should know

A hacker attack has temporarily disabled online services servers of the Turin Polytechnic for a few hours. What did happen? Was it a severe violation? Let’s find it out together! What did happen? A series of cyber attacked hit the Turin Polytechnic authentication servers from several computers spread in the world on the evening 7th January 2021. The first intrusion attempt caused the halting of online authentication servers for about 15 minutes. Hackers tried again at 10 am the following day targeting the app system of the Turin Polytechnic. They used a DDoS attack with the SYNFlood technique. At 10:50 am intruders targeted the network gate of the app system. […]

Emotet infrastracture has been disrupted in Europe

Emotet infrastracture has been disrupted in Europe

Law enforcement agencies from the several EU countries and the UK have dismantled the notorious malware Emotet. The takedown of this malicious botnet happened on Tuesday, 26th January. Emotet is a computer malware program that was originally developed in the form of a banking Trojan. Its main goal was to access devices as well as spy on sensitive private data. As threat, it was particularly sneaky. It has been known to deceive basic antivirus programs and hide from them. Finally, Emotet gained popularity in the cybercrime universe for its modular architecture. Modularity makes it tailorable for every environment it targets. Let’s discover more below. The Emotet threat Experts have labelled […]

Sunburst: the attack that shook the world

Sunburst: the attack that shook the world

Cyber analysts recently discovered the “Sunburst” attack malware, which triggered a series of cyber-espionage attacks that began in the spring of 2020. The attack involved thousands of public administrations, private organizations and individuals on a global scale. American investigators have been pointing fingers at Russian-sponsored hackers. US authorities have labelled it as the most severe cyberattack against public and private bodies alike in the United States and believe that the origin of the threat are Russia-sponsored hackers. How did the Sunburst attack happen? What happened exactly? Let’s explore which intrusion technique hackers employed in this case. First, hackers implanted a malware in the software update of a platform installed in […]

Take a hacker seriously: the story of Raphael Grey

Take a hacker seriously: the story of Raphael Grey

You will take a hacker seriously after reading the story of Raphael Grey. Raphael Grey managed to hack several e-commerce sites, accessing the customers’ credit card data for a month in 2000 at the age of 18. This hack allowed him to steal several million dollars before he was arrested by the British police and the American FBI at his home in rural Wales on March 23, 2000. Prior to his arrest, Grey posted thousands of payment data on the web to highlight the inherent weaknesses of the e-commerce sites of the time. Today we explore the activities of the best known hackers in the history of computer science, known […]

AiR-ViBeR: the hack that exploits PC fans

AiR-ViBeR: the hack that exploits PC fans

Cyber ​​risks, as we know, have always been around the corner. They are insidious and can even silently affect the data of companies and individuals quite easily, if not adequately protected. Some threats are “louder” than others: Mordechai Guri, an Israeli researcher at Ben Gurion University of the Negev, managed to steal data from a PC, not connected to any network connection, by exploiting the vibration of the fans. The hack is called AiR-ViBeR and in order to work it needs to gain access to a PC and a second device that is in close proximity, such as a smartphone. But how does it work? The intrusion method is very […]

Cyber threats linked to COVID

Cyber threats linked to COVID

Has the Coronavirus had negative effects on the state of global cybersecurity? Unfortunately, yes. In the past few hours, there has been a series of cyber-attacks against the Italian pharmaceutical company IRBM, which produces the vaccine researched at the University of Oxford. In total, there were at least seven attacks, defined as “very violent” by the CEO Pietro di Lorenzo. The timing suggests a ‘political’ motive to undermine the position of a vaccine that is cheap and easy to transport: the attacks took place hours after the statement that made public the vaccine’s selling price. A worrying trend But it was not an isolated case. In recent days, we have […]

How the Italian Army defends itself from cyber threats: the RSC

How the Italian Army defends itself from cyber threats: the RSC

The Italian Army has recently made the Cyber ​​Security Department (RSC) operational, after establishing it around two years ago. As threats to cyber space increase exponentially, it is absolutely vital in this day and age to have a unit completely dedicated to the control and protection of all military networks and assistance in the various operational theaters at home and abroad. The Department will have mainly defensive tasks, aimed at intercepting cyber-attack attempts and securing all military devices and equipment connected to the network. Cyberwarfare is a pervasive reality within the international playing field and can have serious operational repercussions. A cyberattack directed at army communications systems can have dire […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close