Cyber-monitor ha fatto un’analisi di oltre 3,5 milioni di password di Italiani pubblicate in rete nelle famigerate “combolists”, ovvero accoppiamenti email:password che dei malintenzionati hanno trafugato e rilasciato apertamente sul web. A questo punto una domanda è sorta spontanea. Quali sono le password più usate dai tifosi delle squadre di calcio Italiane? Per sicurezza, abilitare […]
These links highlight interesting AI-based services creating artificial intelligence content in the forms of audio, video, text and image from textual input of a user. It is crucial to be aware of the potential security risks associated with their use – mainly the unforseen consequences of singularity, basically when you can’t tell the difference between […]
The following is a list of various GitHub repositories that relate to the security of IoT devices and CCTV cameras. These tools can be used to search for and exploit vulnerabilities, analyze network traffic, and control your devices where you have permission on the device itself and the network it is connected to. To limit […]
L’altro ieri è stato arrestato il super latitante Matteo Messina Denaro a Palermo nella clinica la Maddalena, sita in Via San Lorenzo, 312/D (Palermo) che frequentava per una malattia oncologica. I Carabinieri del ROS l’hanno arrestato nel bar della stessa clinica nella prima mattinata del 16/1/2023 ponendo fine alla latitanza di oltre 30 anni del […]
L’Italia è uno dei paesi più colpiti dalle minacce informatiche a livello globale. In questo articolo sono stati analizzati oltre 20000 siti web delle istituzioni, società supply chains, enti pubblici e privati del perimetro cibernetico dell’Italia. Il cyber perimetro dell’Italia è stato analizzato attraverso una serie di key performance indicators, o KPI, basati su dati […]
The study analyzed approximately 3,000 websites in six countries (Turkey, Italy, India, Brazil, Argentina, and Indonesia) that make up the national cyber perimeters of those countries. These websites belonged to institutions, private companies, and organizations that provide essential services or are part of the supply chain in the respective countries. The study used a variety […]
The cybersecurity report was generated analysing the cyber perimeter of public websites of 323 CERTs and CSIRTS in Europe and abroad. Those websites have been analysed for OWASP vulnerabilities, technologies used, HTTPS certificates, CVEs identified and IP information. The data showed that every single entity in the sample had an HTTPS service, a secure system […]
In our contemporary world, where we depend on AI more and more, it is of utmost importance to guarantee that it is utilized in a responsible and ethical way. One concerning issue is the potential of AI to be manipulated for the purpose of disseminating false information, regardless of whether it is intentional or not. […]
A OWASP vulnerabilities and open surface scan of more than two thousands websites in National cyber perimeters of different countries has been carried out to generate data for 5 KPIs to rank the different cyber perimeters in a global cybersecurity index. Cyber perimeter is defined by websites of institutional, private companies and services and supply […]
National cyber perimeters are defined by websites of institutional, private companies and fundamental services and supply chain operating in a country or for the citizens of a country. The countries in this analysis: Turkey🇹🇷, Italy🇮🇹, India🇮🇳, Brazil🇧🇷, Argentina🇦🇷 and Indonesia🇮🇩, a total of ~3k websites was analyed. The tools used include open source tools, like […]