Today, many are wondering what impact the spread of Artificial Intelligence will have on our society. Among the most widespread concerns is the loss of millions of jobs and the...
In recent days, the alleged data leak by Ernst & Young (EY) has become one of the most discussed topics in the international cybersecurity landscape. I decided to reconstruct the...
Have you always thought that the Dark Web is frequented by cybercriminals? Have you always thought that the Dark Web is a dangerous and treacherous network? Today we want to...
In recent years, cybersecurity has risen to the top of the agendas of businesses, institutions, and public administration. But if we look at the numbers, Italy still seems to be...
In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...
The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon's jewels from the Louvre Museum....
AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID...
Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Israel allegedly deployed a global sabotage...
The NIS 2 Decree (Legislative Decree 138/2024), effective October 16, 2024, implements the principles of the European NIS2 Directive, laying the foundation for a more complex operational model of collaboration...
The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025-59287 and with...