Tag Archives: Cybersecurity

Cybersecurity analysts: what they do and why their work is vital

Cybersecurity analysts: what they do and why their work is vital

Cybersecurity analysts are the core of an organization’s security, private and public alike. They have a vital task: ensuring that their IT assets are secure and protect them from violations and attacks. Being a security analyst is everything but an easy job. In achieving their organization’s security, they have the duty to manage the IT security and risks of the entity they work for. This includes analyzing and identifying proper security solutions to make the work environment resilient to threats.   Usually reporting to a CIO (Chief Innovation Officer), their role also involves a constant liaison and engagement with other departments and business units. Cybersecurity analyst jobs require many sophisticated […]

Penetration testing: what it is and why it is important

Penetration testing: what it is and why it is important

Penetration Testing (Pen Test) refers to the activity of systematically attempting to violate a vulnerable component of a system to discover the security breaches in it through a simulated attack. The professional figure that performs such testing is a security analyst acting as a proper hacker. He or she has the task of breaking the system under assessment by following an attack strategy. This service is vital because real hackers may exploit any breaches with ease if an organization does them know them in time. Damage associated with such violations may include data theft, unauthorized access to sensitive files, service disruption, and many more. Penetration Testing should not be confused […]

Cybersecurity career: 4 reasons to consider it

Cybersecurity career: 4 reasons to consider it

Pursuing a career in cybersecurity can be tempting. Figures show that this industry tends to have a zero unemployment rate. Nowadays, the labor market requires cybersecurity skills more than ever. Even non-experts understand that this is a growth area. It has indeed become critical to the fabric of any modern business.  Focusing on security as a job opens up a world of options, from security operations to risk assessments to application security to investigations to compliance. There are as many cybersecurity roles as lines of code running in your browser. Rewards in financial terms and professional satisfaction are the strongest motives to embrace a profession in this industry. This blog explores the […]

Smartworking: how to mitigate cyber risks

Smartworking: how to mitigate cyber risks

Smartworking is a  fertile ground for cyber threats and criminals. As steps to counter the coronavirus outbreak take effect, millions of workers across the globe have been sent home with their laptops many times. Cybercrime is a silent actor that attempts to exploit the vulnerabilities of remote working. Indeed, remote workers can potentially present a number of cybersecurity risks to organizations, and cybercriminals are finding more ways to exploit these weaknesses. With remote work, indeed, attack surfaces are be multiplied. As users we should not never let the guard down. A combination of procedures, tips, precautions, and training could mitigate risks to a great extent.   Read more on our […]

Phishing: how to detect one of the subtlest online threats

Phishing: how to detect one of the subtlest online threats

Phishing is one the subtlest threats in the dark world of cyber threats. The world has been witnessing a surge in phishing attacks since the outbreak of the pandemic. It may be extremely disruptive and carry big security problems, but there are several ways to mitigate this threat. With a caveat: enhancing your cybersecurity through software  is essential, but it is not a silver bullet. Indeed, much depends on users’ behavior and threat actors know that. Let’s explore how, then! How to avoid phishing: identifying threats Scammers have increased their sophistication to induce victims into trap. Phishing emails and text messages may look like they’re from a company you know […]

Cyberwarfare and national economies

Cyberwarfare and national economies

In the dark woods of cyber threats, cyberwarfare is not just as standard threat. It is much more serious than that. It is no secret that big and key strategic businesses are the targets of very sophisticated cyber threats. Many of them are, not surprisingly, state-sponsored. Indeed, such businesses lie at the crosshairs of governments, national intelligence agencies, and even terroristic groups. In this piece, we aim to investigate what are effects of cyberwarfare on national economies and how nations could protect themselves. Cyberwarfare: what is it? First, let’s define what cyberwarfare is. Cyberwarfare refers to those activities carried out by a nation-state or international organizations meant to damage the […]

The revolutionary methods to attack air-gapped devices

The revolutionary methods to attack air-gapped devices

In the last few years, the Cyber-Security Research Center of Israel’s Ben Gurion University of the Negev coordinated by Dr. Mordechai Guri, has developed and tested several new types of malware that allow to covertly steal highly sensitive data from air-gapped and audio-gapped systems. Here we will briefly analyse some of the most surprising techniques that they have successfully tested.      What air-gapped systems are and the difficulty of hacking them The term “air-gapping” indicates a network security measure employed on one or more computers to ensure that a certain computer system is physically isolated from unsecured networks, such as the public Internet or an unsafe local area network. Air-gapped […]

A new campaign of phishing attacks to steal personal data reported

A new campaign of phishing attacks to steal personal data reported

A few days ago, on the 27th of March, industry reporting signalled a new campaign of Covid-19/ coronavirus-themed spear phishing attacks that illegitimately uses the WHO (World Health Organization) mark, to spread another variant of the info-stealer Lokibot, in order to steal personal data and confidential information from the victims of the attack. This is not the first time that this particular malware has appeared, in fact numerous versions, all derived from the original source code, have already been identified. The most disparate methods were also used for what concerns the means of distribution. This spear phishing campaign has already spread rapidly in different parts of the world, especially in […]

A Password is not a Pass-Word

A Password is not a Pass-Word

From bank accounts to entertainment, our virtual life is wider than ever, and with the 4th industrial revolution is only meant to grow at an exponential rate. Within this redefined framework, the security of our virtual life will strongly depend on the passwords we choose to protect it. In 2015 the password manager app Dashlane conducted an analysis on their clients revealing that every user owns an average of 90 accounts online. Therefore the amount of data we potentially expose online is massive and the issue of how to protect them must be addressed. The question is: if you were to live in a house with 90 doors facing the […]

DDOS and botnet attacks: the deadly link

DDOS and botnet attacks: the deadly link

What’s the link between zero-day and DDOS botnet attacks? The growing demand for connectivity and faster data transfer, along with new technology trends such as the Internet of Things (IoT) and the Artificial Intelligence (AI), combined withthe progressive implementation of the 5G network, are going to irreversibly reshape the pre-existing structure of cybersecurity at a global level. It is true that 5G network will bring new services, new capabilities, new technologies and new regulatory requirements, but it will also bring new security threats and an increased attack surface. With IoT inception many and different actors and devices with different security standards will become involved in the transition, requiring superior attack […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close