Steganography, where "steganos" is Greek and stands for "hidden" or "covered," and "graph" stands for "to write", refers to the art and science of communicating in a way that hides the existence of communication. It differs from cryptography as in cryptography, there is visible information that cannot be understood without a key, whereas in steganography,... Continue Reading →
RANSOMWARE IN 2022
Ransomware is a type of malware that locks down files, data or systems, and threatens to erase or destroy the data - or make private or sensitive data to the public - unless a ransom is paid to the cybercriminals who launched the attack. Recent ransomware attacks have targeted state and local governments, which are easier... Continue Reading →
CISCO GUIDELINES TO COUNTERACT PHISHING
Cisco published a guide, made of 5 tips useful to prevent and combat one of the most powerful and dangerous cyber threats: Phishing. The Cisco objective is to raise awareness and alert both people and companies in order to avoid possible attacks, helping to contrast the spread of vulnerabilities exploitable from attackers. Phishing attacks consist... Continue Reading →
How Hackers Can Steal Your Car
On Monday, the European Union Agency for Law Enforcement Cooperation halted a hacking attack which targeted vehicles with keyless entry. The hackers had managed to replace the software of the cars pretending to install an automotive diagnostic solution, and they were thus able to unlock the cars, start the engine and drive away. Europol eventually... Continue Reading →
The psychological consequences of cyberattacks: an IBM study
IBM says that ransomware attacks harm incident responders psychologically. According to a survey conducted by IBM and Morning Consult, hundreds of cybersecurity incident responders indicated ransomware attacks have a significant impact on their mental health. Incident response indicates the activity of immediately identifying an attack lessens its effects, confines the damage, and addresses the root... Continue Reading →
EU to address Cybersecurity vulnerabilities and regulate AI products
The European Commission has published new liability rules on digital products and artificial intelligence (AI) in order to protect consumers from harm, including in cases where cybersecurity vulnerabilities fail to be addressed. The two proposals the Commission adopted on September 28, 2022 will modernize the existing rules on the strict liability of manufacturers for defective... Continue Reading →
CRYPTO.COM HACK
On January 17th, 2022 Crypto.com learned that a small number of users had unauthorized crypto withdrawals on their accounts. Later during the day hundreds of users were hit and it became clear that it wasn’t just an unauthorized withdrawal phenomenon that they were witnessing but that a cybersecurity breach had occurred in their systems. INCIDENT... Continue Reading →
An overview of Conti and the Ransomware-as-a-Service (RaaS) industry
During the past two years, it seems that Conti, a Russian-based cybercriminal organization, has been imposed as one of the most profitable in the entire Ransomware-as-a-Service (RaaS) ecosystem. Chainalysis estimates that the cyber gang grossed the largest profits in 2021 in the RaaS industry: $180 million extorted. In Europe alone, according to cyber criminals' online... Continue Reading →
TRENITALIA CYBER-ATTACK, MARCH 2022
On the morning of March 23rd, all the Trenitalia and RFI ticket offices and self-service machines were found to be unusable, causing inconvenience to thousands of people who rely on them every day to buy their train tickets. The cause of these inefficiencies is the same that interrupted the information services of the Lazio Region... Continue Reading →
PRYNT STEALER: A NEW POWERFUL TOOL IN THE HANDS OF CYBERCRIMINALS
Researchers at cyber threat intelligence company Cyble have discovered a very powerful Windows infostealer named Prynt Stealer, which has been described as one of the most pressing cybersecurity threats at the moment. What can Prynt Stealer do? The infostealer is advertised on some Telegram channels as being able to steal people’s data and carry out... Continue Reading →