Cyber Evolution partners with Nethesis at Digital Heroes Meeting 2025

The Digital Heroes 2025 Meeting, promoted by Nethesis, represents one of the main events in the Italian ICT landscape focused oninnovation, open-source solutions and community among technology partners. This year, Cyber Evolution will take an active role in presenting advanced enterprise cybersecurity solutions, sharing concrete use cases and establishing new partnerships. What is the Digital […]
LECS at RHC Conference 2025: Roberto Camerinesi talks about the new frontier of satellite hacking

LECS will be among the protagonists of the RHC Conference 2025, the benchmark event for the world of cybersecurity in Italy, organized by Red Hot Cyber and scheduled in Rome on May 9 and 10. Official speakers include our CTO Roberto Camerinesi, inventor of the LECS technology and a point of reference in digital security […]
The new European NIS2 regulation: what changes for cybersecurity in Italy

As of Oct. 16, 2024, the Network and Information Security (NIS) decree, which aims to strengthen the cybersecurity of companies and public administrations throughout Europe, came into effect. Let’s find out together what the main changes are, who is involved, and what obligations arise for Italian companies. What is the NIS2 Directive and why it […]
GDPR: how to ensure your company’s regulatory compliance and information security

International regulations, such as the GDPR (General Data Protection Regulation) and ISO (International Organization for Standardization) standards, have become an essential part of the cybersecurity landscape. Ensuring compliance with these regulations not only improves overall data security, but is also critical to avoiding heavy penalties and maintaining customer trust. But how can you ensure that […]
The 3 pillars of cybersecurity: the CIA triad

In today’s cybersecurity landscape, there are fundamental pillars that are essential to understand in order to protect organizations’ and companies’ digital assets from cyber threats. To ensure proper management of cyber data security, in the context of Cyber Security, there are three principles, commonly known as the CIA triad, which are: confidentiality, integrity and availability. […]
Best Practice: 5 key activities for cybersecurity

In an era of evolving and increasingly sophisticated cyber threats, cybersecurity has become a top priority for companies of all sizes. Cyber attacks can cause devastating damage, compromising sensitive data, disrupting business operations and damaging an organization’s reputation. To effectively address these challenges, it is essential to take a proactive and systematic approach to cybersecurity. […]
Phishing alert: how to recognize the attack, is Meta not writing to you!

In recent weeks, we have seen an increasing number of targeted phishing attacks. One particular aspect of this threat is the deception of malicious attackers posing as the well-known Meta group, which includes platforms such as Facebook, WhatsApp, and Instagram. The Modus Operandi of the Strikers The scammers behind these phishing attacks are cleverly exploiting […]
Computer Fraud in the World: The 10 Most Devastating Cases

Cyber fraud is one of the most serious and pervasive threats of the digital age. In fact, these crimes, ranging from the interception of sensitive data to the alteration of computer systems, have had a profound impact globally. Governments, companies of all sizes, and individuals have been affected, testifying to the vast scope and destructive […]
Protecting Yourself from Computer Fraud: Security Tools and Tips

In the digital age, computer fraud has become one of the most significant threats to individuals and businesses. Characterized by the misuse or illegal use of information technology to deceive or steal resources, computer fraud can take many forms. From phishing emails that aim to steal login credentials, to installing malware to control computer systems, […]
Cyber Security for Children: Educating on Data Protection

In the modern digital world, it is important not to neglect the online safety of our children. Cyber security for children has become a daily priority, even considering the widespread use of technological devices from an early age. Therefore, it is the duty of the ‘grown-ups’ to ensure that our little digital explorers are protected […]