Creeper: the first computer virus

The idea of a computer virus was first theorised by the mathematician John von Neumann in 1949, when he envisioned the possibility that a “mechanical organism”, such as a program, could reproduce itself and infect multiple hosts. The title of the first computer virus in history is attributed to a program called Creeper, created by Bob Thomas from BBN Technologies in 1971.

Read more
ShinyHunters, one of the most recognised threat actors among the hacking community

Over the past year, ShinyHunters has become one of the most recognised threat actors among the hacking community, by carrying out sophisticated cyberattacks on over 40 online services across the world, and by selling the stolen information for profit.

Read more
Juspay Data Breach

A statement released by Juspay on 5th January 2021 confirms that the Indian-based company has been the target of a cyberattack resulting in a large-scale data breach.

Read more
2020 FireEye Breach

On the 8 December 2020, prominent US-based cybersecurity company FireEye announced on its blog that they had been the victims of a cyber-attack. The nature of the attack has led to experts to theorise that it was carried out by a state-sponsored hacking group, currently believed to be Cozy Bear (also known as APT29).

Read more
No stop to the theft of personal data on the web during the pandemic: in the first half of 2020, cases increased by 26.6% compared to 2019.

The users most at risk are men between the ages of 31 and 40. 73.2% of stolen accounts are linked to entertainment sites (online gaming and streaming), followed by financial services. Italy ranks 6th overall among the most affected countries.

Read more
How to protect yourself against phishing emails

Phishing (the act of sending emails purporting to be from reputable companies in order to get the user to disclose personal information such as credit card numbers or passwords) is a worryingly common occurrence in the modern age. Whilst email spam filters are much more effective at catching these emails, it is still possible for fraudulent emails to slip through. Below are some tips to help you identify if an email is in fact a phishing email.

Read more
What is the dark web?

The internet, as the saying goes, is like an iceberg. You’ve almost certainly heard this before, or even seen one of the many, many graphics representing this metaphor. Whilst it is old as the hills (or glaciers?) it is a relatively simple way of describing the strata of the internet, if slightly clumsy and archaic.

Read more


Let's talk

Please fill in the form below (fields with * are mandatory) and we will respond to your request as soon as possible!