Advertisement ยท 728 ร— 90

Posts by Sofia Scozzari Z. Manzoni

Have you check our last monthly report?

3 weeks ago 0 0 0 0

Thank you!

3 weeks ago 0 0 0 0

Our last #RiskFridayโคต๏ธ

3 weeks ago 0 0 0 0

Our last ๐Œ๐ข๐๐๐ฅ๐ž ๐„๐š๐ฌ๐ญ ๐‚๐ฒ๐›๐ž๐ซ ๐‚๐จ๐ง๐Ÿ๐ฅ๐ข๐œ๐ญ ๐–๐ž๐ž๐ค๐ฅ๐ฒ ๐Œ๐จ๐ง๐ข๐ญ๐จ๐ซ โคต๏ธ

3 weeks ago 0 0 0 0

Israel is the most targeted country for the first time.

Discover more on hackrisk.io

3 weeks ago 0 0 0 0

Thank you for this interview, ๐™๐™๐™š ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™€๐™ญ๐™ฅ๐™ง๐™š๐™จ๐™จ: ๐–๐ก๐ฒ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐Œ๐ฎ๐ฌ๐ญ ๐Œ๐จ๐ฏ๐ž ๐๐ž๐ฒ๐จ๐ง๐ ๐“๐ž๐œ๐ก๐ง๐จ๐ฅ๐จ๐ ๐ฒโคต๏ธ

3 weeks ago 0 0 0 0

Our last #HackTuesday

3 weeks ago 0 0 0 0
Preview
Kaspersky flags talent gap in UAE supply chain security A shortage of skilled cybersecurity talent is limiting organisationsโ€™ ability to monitor third-party vulnerabilities consistently

Full article here: gulfbusiness.com/en/2026/cybe...

3 weeks ago 0 0 0 0

According to a new study by Kaspersky:
40% of UAE companies are suffering a lack of qualified IT security professionals
47% in UAE are struggling to mitigate risks linked to supply chain
78% of global organisations need to strengthen protection against supply chain and trusted relationship threats

3 weeks ago 0 0 1 0
Advertisement

"Lโ€™impatto complessivo di queste operazioni viene valutato da Hackmanac tramite lโ€™Esix, un indice che valuta la gravitร  complessiva degli attacchi: valori superiori a 6 indicano attacchi con potenziale di danno significativo."

2 months ago 0 0 0 0

โ€œMuddyWater ha colpito oltre 100 entitร  governative in Medio Oriente e Africa, UNC1549 ha violato fornitori taiwanesi per infiltrarsi in piรน di 1.000 domini, e APT42 ha preso di mira anche i familiari di funzionari governativi."

2 months ago 0 0 1 0
Preview
I cyber attacchi sono l'arma segreta dell'Iran. Chi c'รจ dietro, le strategie e le tattiche usate per fare guerra in rete Negli ultimi anni, lโ€™Iran ha fatto del cyberspazio uno strumento centrale della propria strategia di potenza. Tra spionaggio, sabotaggio, campagne di disinformazione e guerra psicologica, il paese uti...

Un sentito ringraziamento a @wired.com Italia, Elena Betti, e al Direttore @lukelike.bsky.social per aver pubblicato la nostra analisi sul fenomeno dell'Information Warfare collegato all'Iran.

www.wired.it/article/come...

2 months ago 1 0 1 0
Post image

Hugging Face was recently abused to distribute Android malware via a deceptive security app.
The campaign focused on credential theft and persistent access, showing how trusted platforms can be misused.

#CyberSecurity #Android #HuggingFace #MobileSecurity #ThreatResearch

2 months ago 1 1 0 0

Our last #RiskFriday with:

1๏ธโƒฃ Record Weekly Average ESIXยฉ (4.92!)
2๏ธโƒฃ Only increasing trends
3๏ธโƒฃ All Top 5 Impactful Threat Actors new entries
4๏ธโƒฃ Poland +62% (!)
5๏ธโƒฃ News / Multimedia +21%

Explore the complete data and weekly trends on hackrisk.io

2 months ago 0 0 0 0

Growing up in cybersecurity requires a more mature and responsible approach. The process will be uncomfortable and complex. But we will get there eventually because adolescence is only a temporary phase.

3/3

3 months ago 0 0 0 0

This made me realise something uncomfortable: as an industry, we are not fully mature yet.

Compliance plays an essential role, but too often it is the only driver of security measures. Just like teenagers, we still rely on supervision to avoid making the wrong choices.

2/3

3 months ago 0 0 1 0

๐–๐ž ๐€๐ซ๐ž ๐’๐ญ๐ข๐ฅ๐ฅ ๐“๐ž๐ž๐ง๐š๐ ๐ž๐ซ๐ฌ ๐ˆ๐ง ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ

I've been thinking a lot about maturity in cybersecurity.

Over the years, awareness has certainly improved. We talk more about attacks, risk, and resilience. And yet, when decisions have to be made, we often rely only on frameworks and certifications

1/3

3 months ago 0 0 1 0

In continuous-risk environments, recovery should not be treated as a reward or an exception, it should be a ๐ฉ๐ฅ๐š๐ง๐ง๐ž๐ ๐š๐ง๐ ๐ž๐ฑ๐ฉ๐ž๐œ๐ญ๐ž๐ ๐จ๐ฉ๐ž๐ซ๐š๐ญ๐ข๐จ๐ง๐š๐ฅ ๐ฉ๐ก๐š๐ฌ๐ž.

This is why I strongly believe ๐œ๐ฒ๐›๐ž๐ซ ๐ซ๐ž๐ฌ๐ข๐ฅ๐ข๐ž๐ง๐œ๐ž ๐ข๐ฌ ๐ฅ๐ž๐ฌ๐ฌ ๐š๐›๐จ๐ฎ๐ญ ๐›๐จ๐ฎ๐ง๐œ๐ข๐ง๐  ๐›๐š๐œ๐ค ๐Ÿ๐š๐ฌ๐ญ๐ž๐ซ ๐š๐ง๐ ๐ฆ๐จ๐ซ๐ž ๐š๐›๐จ๐ฎ๐ญ ๐๐ž๐ฌ๐ข๐ ๐ง๐ข๐ง๐  ๐ฌ๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ ๐ญ๐ก๐š๐ญ ๐š๐›๐ฌ๐จ๐ซ๐› ๐๐ข๐ฌ๐ซ๐ฎ๐ฉ๐ญ๐ข๐จ๐ง.

3/3

4 months ago 0 0 0 0
Advertisement

Today, cyber attacks are persistent, frequent, and increasingly sophisticated. They are part of normal operating conditions.

๐…๐ซ๐š๐ฆ๐ข๐ง๐  ๐ซ๐ž๐ฌ๐ข๐ฅ๐ข๐ž๐ง๐œ๐ž ๐š๐ฌ ๐ฌ๐จ๐ฆ๐ž๐ญ๐ก๐ข๐ง๐  ๐ญ๐ก๐š๐ญ ๐š๐œ๐ญ๐ข๐ฏ๐š๐ญ๐ž๐ฌ ๐š๐Ÿ๐ญ๐ž๐ซ ๐š๐ง ๐ข๐ง๐œ๐ข๐๐ž๐ง๐ญ ๐ฉ๐ฎ๐ฌ๐ก๐ž๐ฌ ๐ญ๐ก๐ž ๐ฉ๐ซ๐จ๐›๐ฅ๐ž๐ฆ ๐ข๐ง๐ญ๐จ ๐ญ๐ก๐ž ๐Ÿ๐ฎ๐ญ๐ฎ๐ซ๐ž ๐ข๐ง๐ฌ๐ญ๐ž๐š๐ ๐จ๐Ÿ ๐š๐๐๐ซ๐ž๐ฌ๐ฌ๐ข๐ง๐  ๐ข๐ญ ๐š๐ญ ๐ญ๐ก๐ž ๐๐ž๐ฌ๐ข๐ ๐ง ๐ฌ๐ญ๐š๐ ๐ž.

2/3

4 months ago 0 0 1 0

๐‚๐ฒ๐›๐ž๐ซ ๐‘๐ž๐ฌ๐ข๐ฅ๐ข๐ž๐ง๐œ๐ž ๐ˆ๐ฌ ๐€๐›๐จ๐ฎ๐ญ ๐ƒ๐ž๐ฌ๐ข๐ ๐ง, ๐๐จ๐ญ ๐‘๐ž๐œ๐จ๐ฏ๐ž๐ซ๐ฒ

For a long time, in cybersecurity, we talked about resilience mainly in terms of recovery.
That made sense when cyber attacks were still perceived as rare events, but that context no longer exists.

Here is my latest article โคต๏ธ

1/3

4 months ago 0 0 1 0

Our last #RiskFriday โคต๏ธ

4 months ago 0 0 0 0

Sextortion is a growing threat.
Discover here what it is, who is most at risk and what to do (or not to do)โคต๏ธ

7 months ago 1 0 0 0

Our last #HackTuesday: discover who was most targeted last week โคต๏ธ

7 months ago 0 0 0 0
Preview
SonicWall firewall devices hit in surge of Akira ransomware attacks SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, potentially exploiting a previously unknown security vulnerability, according to cybersecurity company Arctic Wolf.

SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, potentially exploiting a previously unknown security vulnerability, according to cybersecurity company Arctic Wolf.

8 months ago 7 8 0 0
Preview
Anthropic says OpenAI engineers using Claude Code ahead of GPT-5 launch Anthropic says it has revoked OpenAI's access to the Claude API after ChatGPT's engineers were found using Claude's coding tools.

Anthropic says it has revoked OpenAI's access to the Claude API after ChatGPT's engineers were found using Claude's coding tools.

8 months ago 4 3 0 0
Preview
From Georgia to Ukraine: Seventeen Years of Russian Cyber Capabilities at War - Modern War Institute In August 2008, as Russian tanks rolled into Georgiaโ€™s Tskhinvali Region, not self-proclaimed South Ossetia, Georgian government websites were under cyber siege. Distributed denial-of-service (DDoS) a...

FROM GEORGIA TO UKRAINE: SEVENTEEN YEARS OF RUSSIAN CYBER CAPABILITIES AT WAR, mwi.westpoint.edu/from-georgia...

8 months ago 2 2 0 0
Advertisement

๐—™๐—ถ๐—ฟ๐˜€๐˜ #๐—ฅ๐—ถ๐˜€๐—ธ๐—™๐—ฟ๐—ถ๐—ฑ๐—ฎ๐˜† ๐—ผ๐—ณ ๐—”๐˜‚๐—ด๐˜‚๐˜€๐˜ ๐—ฏ๐˜‚๐˜ ๐—ฎ๐—น๐—น ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ ๐—๐˜‚๐—น๐˜†!

8 months ago 0 0 0 0

Our last #RiskFriday โคต๏ธ

9 months ago 0 0 0 0

Last #HackTuesday

9 months ago 0 0 0 0

Are Cybersecurity and ESG two separate worlds?
We don't think so and we tracked some connections โคต๏ธ

9 months ago 1 0 0 0