In Evidence


- 5 July 2022
- Francesco Bussoletti
- Cyber, Defence and Security
TAG cybersecurity experts: The breadth of targets in those campaigns stands in contrast to many government-backed operations.

- 5 July 2022
- Francesco Bussoletti
- Defence, Defence and Security
Ankara amasses forces on the borders of Raqqa and Hasaka. In addition, it holds exercises with allied militias and increases the pressure of artillery against the Kurds.

- 4 July 2022
- Francesco Bussoletti
- Cyber, Defence and Security
Reversing Labs cybersecurity experts: Who opened the malicious Word attachment is required to make multiple, additional clicks to activate the embedded malware.

- 4 July 2022
- Francesco Bussoletti
- Defence, Defence and Security
Overview of the situation in waters around the world in the last month, by the Italian company thanks to the data provided by its M.A.R.E. intelligence platform.

- 1 July 2022
- Francesco Bussoletti
- Cyber, Defence and Security
The data breach could create huge problems to Moscow. Both on the propaganda on Ukraine and the internal security level. Data could boost cyber warfare/espionage.
Restricted Area
“Restricted Area” is born: a new exclusive channel in Italian and English on the latest cyber security researcher JAMESWT hunting, documented with pictures. For the moment it’s open, but soon it will only be visible by subscription.
Defence
5 July 2022
Ankara amasses forces on the borders of Raqqa and Hasaka. In addition, it holds exercises with allied militias and increases the pressure of artillery against the Kurds.
4 July 2022
Overview of the situation in waters around the world in the last month, by the Italian company thanks to the data provided by its M.A.R.E. intelligence platform.
1 July 2022
Combat Team Alpha (CTA) with armored vehicles, special forces and an airlift component deployed in Cabo Delgado. An ad hoc base in Macomia is also under construction.
30 June 2022
The decision after the discovery of a crowfunding campaign to buy the UAVs. The Turkish company: Allocate the funds raised to the population.
28 June 2022
They exploit the networks dug by the former ISIS when it was in power. Objective: to hide the weapons and missiles from the eyes of the satellites and the F-35s of the Jewish state.
27 June 2022
The army blocked a vehicle with two suspected ISWAP militiamen on board, carrying the cargo. Suspicions are growing about the transfer of pro-ISIS jihadists to the South.
24 June 2022
The biggest obstacle to the operativity of the anti-ISIS force is the lack of a budget. A solution is being discussed in Baghdad. It could break the deadlock.
23 June 2022
It’s unknown, but it has so far saved over 1,000 people since the Russian invasion began. It operates in small groups and on emergency vehicles, evacuating entire families.
Cyber
5 July 2022
TAG cybersecurity experts: The breadth of targets in those campaigns stands in contrast to many government-backed operations.
4 July 2022
Reversing Labs cybersecurity experts: Who opened the malicious Word attachment is required to make multiple, additional clicks to activate the embedded malware.
1 July 2022
The data breach could create huge problems to Moscow. Both on the propaganda on Ukraine and the internal security level. Data could boost cyber warfare/espionage.
30 June 2022
CVE-2019-0820, CVE-2020-15522 and CVE-2021-43569 can be exploited by a remote non-authenticated attacker via the Internet. Update the systems!
28 June 2022
CERT-UA cybersecurity experts: "Free primary legal aid" email and password protected "Algorithm of actions of members of the family of a missing serviceman LegalAid.rar" spread the malware.
27 June 2022
The web responds with teasing and Twitter memes, remembering that this happens when you invade a sovereign nation like Ukraine.
24 June 2022
Bitdefender cybersecurity experts: The campaign changed malware in February when one of the lead developers was killed in the Russian invasion of Ukraine.
23 June 2022
Cybersecurity experts believe it hasn’t been a cyber attack. A real threat would materialize if the Tehran’s hackers were able to disable them in the event of an attack.