In recent years IoT technology has considerably transformed our world, connecting everyday objects to the internet and enabling new possibilities. At the same time, this new era of connectivity has exposed us to new security risks, with cybercriminals constantly trying to take advantage of vulnerabilities.
Read moreQR codes have become very popular in recent years and can be used for many purposes. Cybercriminals exploit them to lure users into sharing a variety of personal information such as credentials and financial data. As the number of quishing attacks continues to grow, it is important to know how to protect.
Read moreIn the last years the world of cybercrime has been constantly developing, leading to a growing number of cyberattacks carried out by different hacking syndicates. This article provides a general overview of the 10 current prominent hacking groups, exploring their systems, motivations and tactics.
Read moreAt the moment LockBit 3.0 stands out as the world’s most successfully run ransomware group and have conducted over 850 attacks in 2023. Their unique way of operating has allowed them to collect $91m in ransom since 2020, with FBI monitoring showing limited impact so far.
Read moreIn the last years many countries have invested deeply in digital security. Despite being world’s 8th largest economy, Italy has been struggling with the process of digitalization and is still considered as an easy target for cyberattacks. Why is it so?
Read moreRansomware is continuously developing and becoming more and more sophisticated. It isn’t going anywhere anytime soon, but where did it come from? Where did it go? And how has it evolved?
Read moreIdentity theft casts a long shadow over our nascent digital world. It's a crime that can strike anyone anywhere with devastating consequence. In this article, we will delve into the effects of identity theft on victims, both in terms of financial losses and the emotional toll it takes.
Read moreSmishing scams: we all think to know how to spot them and avoid them and how to protect ourselves and stay safe from this type of phishing. But what happens when it really works? Read our true story.
Read morePlease fill in the form below (fields with * are mandatory) and we will respond to your request as soon as possible!