The NIS 2 Decree (Legislative Decree 138/2024), effective October 16, 2024, implements the principles of the European NIS2 Directive, laying the foundation for a more complex operational model of collaboration...
The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025-59287 and with...
In an age where every question is answered with a simple tap, we users have perhaps gotten a little too comfortable with the new AI-based assistants. Ultimately, it makes little...
Von der Leyen launches "AI First" at Italian Tech Week: three obstacles to overcome and a €2 billion startup lost along the way. Turin, October 3, 2025. Before thousands of...
We often try to explain the hybrid, simultaneous, and contradictory world in which young people live in perpetual connection, but the truth is that as adults, we struggle to understand...
This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...
A tool has appeared on the cybercriminal market that has quickly become a mass-produced weapon for dozens of groups. It's HeartCrypt , a malware packaging service masquerading as a legitimate...
The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in domestic priorities, and...
A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create malicious apps that perfectly mimic official services like Microsoft...
In an era where personal data is being produced and shared on a massive, daily basis, the concept of anonymization takes on a central role in the debate on privacy...