Researchers at cyber threat intelligence company Cyble have discovered a very powerful Windows infostealer named Prynt Stealer, which has been described as one of the most pressing cybersecurity threats at the moment. What can Prynt Stealer do? The infostealer is advertised on some Telegram channels as being able to steal people’s data and carry out... Continue Reading →
CRYPTOGRAPHY, ENCRYPTION AND ENCODING: LET US TACKLE THE MISUNDERSTANDINGS
Cyber-Taxonomy In order to clarify ideas, we shall start from the formal definition of these three fundamental components of Cybersecurity. The term cryptography came about during the 1650s with the meaning of “art of writing in secret characters” from Modern Latin. Encryption, instead, stands for the process used to convert simple readable data known as... Continue Reading →
THE CYBER ATTACK AGAINST ITALIAN HEALTHCARE
During 2021 the number of cyber-attacks toward the Italian healthcare sector increased by 24.8% compared to 2020 figures, making it 13% of all targets hit by attackers during 2021. From the infamous combination of phishing emails and ransomware (the following examples were all carried out with these techniques) to the falsification of Green Pass documentation.... Continue Reading →
NVIDIA UNDER ATTACK – DATA BREACH AND MAJOR CONSEQUENCES
Nvidia, one of the largest microchip companies, has been hacked by a group of hackers called Lapsus$. The company became aware of the data breach on February 23rd, the hackers stole employees’ credentials, schemes of GPUs, source code of various firmware, drivers, and proprietary Nvidia software, the total amount of data stolen is about 1... Continue Reading →
A LONG LASTING CYBERWAR AGAINST UKRAINE
The whole world is currently following closely what is happening in Ukraine since February 24th, which is most understandable given the seriousness of the events. Together with the military actions, several specialists and newspapers raised the implication of cyberspace in the war being waged. Contrary to what this growing interest in the cyber contribution seems... Continue Reading →
Spoofing Explained
How I Met Your Mother Have you ever watched the episode entitled “The Playbook” (05x08) of How I met your Mother? If you haven’t, you are missing twenty-four minutes of entertainment. And if you have, well, you do have a concrete representation of what spoofing looks like. Spoofing is the action of pretending to be... Continue Reading →