With the increased level of user awareness of the dangers of online phishing and the effectiveness of modern browsers in blocking malicious downloads, cybercriminals are innovating their tactics. One of the most insidious methods that…
In recent weeks, the cybersecurity landscape has faced a serious threat: 2,000 Palo Alto Networks firewalls were compromised following attacks targeting two recently patched 0-day vulnerabilities. These attacks highlight the constant danger organisations face in…
In today’s cybersecurity landscape, Black Friday represents a critical period when companies need to step up their defences against potential cyber attacks, taking a proactive approach to ensure the security of their systems. Indeed, the…
In Italy, the first half of 2024 saw a persistent trend in the use of malware by malicious actors, albeit with a slight decrease compared to the previous period (Clusit Report 2024). The wide range…
In 2024, phishing attacks continue to be one of the most insidious threats in the cyber security landscape. With increasingly sophisticated techniques and advanced tools, cyber criminals are able to deceive users and companies, stealing…
The boundaries of cyber-attacks are increasingly liquid today. Enabling technologies can be used to provoke unprecedented operations on an international scale, such as Israel’s operation against Hezbollah. As cybersecurity experts, let us analyse from an…
An advertisement for the sale of a vast database and 5 million pieces of data stolen from Italian websites. This is what was spotted on some forums dedicated to cyber attacks last August and concerning…
On 19 July 2024, a global technical failure affected Windows operating systems worldwide, causing the infamous ‘blue screen of death’ (BSoD). This problem knocked out 8.5 million Windows devices, including banks, airports, emergency services and…
An alarming escalation of attacks exploits the vulnerability CVE-2024-24919, which affects Check Point security gateways. This leak, classified as ‘serious’, allows attackers to extract sensitive information from devices connected to the Internet and enabled with…
Background: Open Directory and Threat Intelligence An open directory is a vulnerability that occurs when file access permissions are not properly configured on a Web server. This makes files and directories that should be confidential…