In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built on a much simpler foundation: a download link. The Notepad++...
Android has never been so exploited, at least according to the latest developments reported by a recent investigation. Google announced that it has dismantled what may be the largest network...
A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking on verification boxes without thinking twice? Now, it seems that...
The WinRAR security flaw, which emerged last summer, has become more widespread than expected. Several organizations, both common criminals and nationally funded APT groups, are actively exploiting this vulnerability, as...
The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news...
This article is the first in a series of three articles exploring the delicate relationship between cybersecurity professionals and the current regulatory framework. In this first installment, we will analyze...
The LockBit group, which many had quickly dismissed after high-profile failures and leaks, unexpectedly returned to the scene. In the fall of 2025, it unveiled a new version of its...
There's a convenient misconception in Italy: thinking that cybersecurity is a matter for ministries or large strategic players. It's reassuring. And it's wrong. In the real design of public connectivity,...
One of the most common mistakes, despite the GDPR's implementation since 2018, is to consider only security breaches involving sensitive data as data breaches. This is often a fatal error...
In the world of cybersecurity, we often talk about attacks, vulnerabilities, and incidents. Less is said about a silent variable that runs through the entire sector: fatigue . Not end-of-day...