In 2024, phishing attacks continue to be one of the most insidious threats in the cyber security landscape. With increasingly sophisticated techniques and advanced tools, cyber criminals are able to deceive users and companies, stealing…
The boundaries of cyber-attacks are increasingly liquid today. Enabling technologies can be used to provoke unprecedented operations on an international scale, such as Israel’s operation against Hezbollah. As cybersecurity experts, let us analyse from an…
An advertisement for the sale of a vast database and 5 million pieces of data stolen from Italian websites. This is what was spotted on some forums dedicated to cyber attacks last August and concerning…
On 19 July 2024, a global technical failure affected Windows operating systems worldwide, causing the infamous ‘blue screen of death’ (BSoD). This problem knocked out 8.5 million Windows devices, including banks, airports, emergency services and…
An alarming escalation of attacks exploits the vulnerability CVE-2024-24919, which affects Check Point security gateways. This leak, classified as ‘serious’, allows attackers to extract sensitive information from devices connected to the Internet and enabled with…
Background: Open Directory and Threat Intelligence An open directory is a vulnerability that occurs when file access permissions are not properly configured on a Web server. This makes files and directories that should be confidential…
Introduction: Context DDoSia, an attack toolkit used to perpetrate Distributed Denial of Service (DDoS), has been created and utilized by the hacktivist nationalist group NoName057(16), which is supportive of Russia. This group primarily targets countries…
A due foreword on Ransomware as a Service: the ever-evolving threat Ransomware is a type of malware that encrypts victims’ data and demands a ransom in exchange for de-encryption. In recent years, ransomware has become…
Brute force attempts on national VPNs: The cybersecurity landscape right now is marked by a series of brute force attacks targeting various platforms, with a worrying focus on VPNs (Virtual Private Networks). The phenomenon, detected…
Ransomware and data encryption: a bit of history For years, criminals operating under ransomware attacks have been encrypting victims’ files directly from Windows operating systems. The effort of ransomware distribution has always been quite high,…