In recent days, DeepSeek, a new artificial intelligence model of Chinese origin, has rapidly gained popularity and sparked discussions both economically and in terms of cybersecurity. On one hand, many observers note how DeepSeek has…
For a long time, the main mode of software development has globally rested on the concept of ‘as long as it works’, and most applications (particularly web applications) developed over the last two decades have…
On 19 December 2024 at 00:03 UTC, ransomware group LockBit announced the release of LockBit 4.0 on its leak site (DLS). Known for its aggressive tactics and frequent updates, LockBit introduces an even more advanced…
In the last days of 2024, Italy faced a series of significant cyber attacks, mainly of the Distributed Denial of Service (DDoS) type, which temporarily rendered several institutional and corporate sites inaccessible. These attacks, claimed…
With the increased level of user awareness of the dangers of online phishing and the effectiveness of modern browsers in blocking malicious downloads, cybercriminals are innovating their tactics. One of the most insidious methods that…
In recent weeks, the cybersecurity landscape has faced a serious threat: 2,000 Palo Alto Networks firewalls were compromised following attacks targeting two recently patched 0-day vulnerabilities. These attacks highlight the constant danger organisations face in…
In today’s cybersecurity landscape, Black Friday represents a critical period when companies need to step up their defences against potential cyber attacks, taking a proactive approach to ensure the security of their systems. Indeed, the…
In Italy, the first half of 2024 saw a persistent trend in the use of malware by malicious actors, albeit with a slight decrease compared to the previous period (Clusit Report 2024). The wide range…
In 2024, phishing attacks continue to be one of the most insidious threats in the cyber security landscape. With increasingly sophisticated techniques and advanced tools, cyber criminals are able to deceive users and companies, stealing…
The boundaries of cyber-attacks are increasingly liquid today. Enabling technologies can be used to provoke unprecedented operations on an international scale, such as Israel’s operation against Hezbollah. As cybersecurity experts, let us analyse from an…