Loading...
Blog2021-02-16T10:39:13+00:00
1501, 2020

ESET discovered an abnormal installing technique

ESET research team, during the analysis of cyber attack aiming for Middle East targets, detected a technically interesting downloader. The malware uses a number of contradictory techniques, one of them standing out: the insertion of a local port monitor system [...]

1501, 2020

Threat predictions for 2020

Increase in complexity and sophistication as well as more targeted attacks are expected in the upcoming 12 months based on cyber crime activity of the past year, according to various resources that have conducted research over the subject. Advancements in [...]

3112, 2019

AI or not AI; that’s the question

The National Institute of Standards and Technology have had plans to move to a vulnerability scoring method that uses IBM’s Watson artificial intelligence system by October 2019. So far, Watson stumbled when evaluating new and complex vulnerabilities. AI is [...]

2911, 2019

Interoperability challenges of cyberthreat intelligence

Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time [...]

611, 2019

Cyber Security Act Regulation: An Italian Perspective

One year after the Network and Information Security Directive, the European Parliament and the Council adopted the Cyber Security Act Regulation. The two acts, together with the GDPR, constitute the pan-European digital security system, according to an article signed [...]

3010, 2019

Unwanted cybersecurity!

Being the CEO of a small Danish company that works internationally, I cannot avoid being abroad while some bank transactions are due. Recently, while taking part in a workshop at one of our pilot municipalities in the EU, I had [...]

2510, 2019

Governments need to fund adequately their innovation efforts

While the Government here in Italy has announced various changes and plans to reorganize the cybersecurity effort on a national level, it is not clear the practical effect of these proposals. Recently the organization of a new ministry for technological [...]

Go to Top