Archivi categoria : Cybersecurity

Trellix Advanced Research Center Discovers a New Privilege Escalation Bug Class on macOS and iOS

Since the first version of iOS on the original iPhone, Apple has enforced careful restrictions on the software that can run on their mobile devices. Only applications that were cryptographically signed by a developer certificate trusted by Apple could be executed, and scripting languages like AppleScript were not found on iOS. https://www.trellix.com/en-us/about/newsroom/stories/research/trellix-advanced-research-center-discovers-a-new-privilege-escalation-bug-class-on-macos-and-ios.html
Read more

LINEE GUIDA PER IL DISASTER RECOVERY DELLE PUBBLICHE AMMINISTRAZIONI

Il CAD sancisce che gli uffici pubblici devono essere organizzati in modo che sia garantita la digitalizzazione dei servizi (art. 15 “Digitalizzazione e riorganizzazione”). Da tale indicazione consegue, per la Pubblica Amministrazione (nel prosieguo PA), anche l’obbligo di assicurare la continuità dei processi che presiedono alla erogazione dei propri servizi, quale presupposto per garantire il…
Read more

HOW TO DESIGN YOUR SECURITY OPERATIONS CENTER (SOC) TO WORK SMARTER, NOT HARDER

In today’s digital economy, data isn’t just ameans to create value, it has value itself. If banks were the target of the last century, data is the target of this century. The increasing use of tactics like social engineering and deep fakes,coupled with the ever-present threats of global warfare and infrastructure attacks endanger everything from…
Read more

What is Cyber Hygiene and Why is it Important?

Cyber hygiene, or cybersecurity hygiene, is a set of practices organizations and individuals perform regularly to maintain the health and security of users, devices, networks and data. This guide will walk you through why cyber hygiene is important. What_is_Cyber_Hygiene_and_Why_is_it_Important  
Read more