We often hear about BEC, an acronym that stands for Business Email Compromise, a threat we all face every day in our mailbox. But in fact, what are we talking about? How to avoid falling…
In recent days, DeepSeek, a new artificial intelligence model of Chinese origin, has rapidly gained popularity and sparked discussions both economically and in terms of cybersecurity. On one hand, many observers note how DeepSeek has…
For a long time, the main mode of software development has globally rested on the concept of ‘as long as it works’, and most applications (particularly web applications) developed over the last two decades have…
On 19 December 2024 at 00:03 UTC, ransomware group LockBit announced the release of LockBit 4.0 on its leak site (DLS). Known for its aggressive tactics and frequent updates, LockBit introduces an even more advanced…
In the last days of 2024, Italy faced a series of significant cyber attacks, mainly of the Distributed Denial of Service (DDoS) type, which temporarily rendered several institutional and corporate sites inaccessible. These attacks, claimed…
With the increased level of user awareness of the dangers of online phishing and the effectiveness of modern browsers in blocking malicious downloads, cybercriminals are innovating their tactics. One of the most insidious methods that…
In the cybersecurity landscape, the focus has often been on identifying threats, which is crucial but not sufficient to ensure a comprehensive defence. The Cyberoo team has observed a growing need to improve remediation management,…
In recent weeks, the cybersecurity landscape has faced a serious threat: 2,000 Palo Alto Networks firewalls were compromised following attacks targeting two recently patched 0-day vulnerabilities. These attacks highlight the constant danger organisations face in…
In today’s cybersecurity landscape, Black Friday represents a critical period when companies need to step up their defences against potential cyber attacks, taking a proactive approach to ensure the security of their systems. Indeed, the…
In the world of cybersecurity, incident response is a crucial process that requires precision and expertise. A significant example of an effective intervention by Cyberoo Incident Response Team is the case of a well-known consultancy…