In recent years, ransomware has ceased to be a problem confined to IT. Today, it is a crisis that affects the entire organisation, from business continuity to strategic management decisions. Against this backdrop, a new…
Tech Blog
CERT Posts
For a long time, artificial intelligence in the military sphere was portrayed as a collection of experimental projects, often operating in isolation and deployed in specific contexts. In recent months, this pattern has changed radically….
When we talk about cybersecurity as it applies to cultural heritage, we tend to picture almost academic scenarios. Yet, between late January and early February 2026, the Uffizi Galleries in Florence found themselves at the…
In today’s digital world, identity is no longer just a document in your wallet. It is a much broader and more dynamic set of information stored on our devices, in the apps we use and…
The digital ecosystem in which our daily lives are immersed seems to have the usual watchword: free. We use free apps, free platforms, free services; the reality, however, is quite different. The façade of the…
There is a stage in many real-world investigations that always plays out in the same way, yet rarely features in public reports. When the attacker is already inside, has a clean and silent foothold, and…
In recent years, one thing has become very clear to anyone working in cybersecurity: credential theft has turned into one of the main engines of the online criminal economy. Not because it is particularly sophisticated,…
When an AI assistant enters the heart of business productivity, every logical flaw becomes a real risk. In recent days, Microsoft has confirmed a problem in Microsoft 365 Copilot that allowed the system to access…
Since February 2, the University of Rome “La Sapienza” has been grappling with one of the most serious cyber incidents ever recorded in the Italian academic sector. For several days, the institutional website and numerous…
When we talk about phishing, many people still imagine those clumsy emails full of mistakes and easy to trash. The truth, however, is that the attacks that really hurt look nothing like that stuff. They…
Tech Updates
Network Intrusion Detection Systems (NIDS) are fundamental tools in contemporary computer security, designed to identify malicious activity and security policy violations through continuous monitoring of network traffic. The primary objective of a NIDS is to…
In the cybersecurity landscape, the focus has often been on identifying threats, which is crucial but not sufficient to ensure a comprehensive defence. The Cyberoo team has observed a growing need to improve remediation management,…
In recent months CYBEROO has launched Cypeer Agent X: an advanced agent designed to enhance the Cypeer MDR (Managed Detection and Response) with an in-depth analysis of the company’s security posture. In this article, we…
In recent months, we have released a new module for the MDR Cypeer: CypeerPOT. This new functionality further enriches the capabilities of our Managed Detection and Response (MDR), offering an advanced way to identify ongoing…
Realized a new Dashboard for immediate horizontal correlation of alerts The introduction of the new alert management dashboard represents a significant step forward in the way companies monitor and manage internal security. In fact, this…
CSI (Cyber Security Intelligence) is CYBEROO’s Threat Intelligence service, based on Open Source Intelligence. Its goal is to detect, collect and analyze sensitive information and data found in the Deep and Dark Web to protect…
CYBEROO’s continuous investment in R&D has made possible the release of important updates to the Cypeer module, with the implementation of advanced Adaptive AI and Machine Learning technologies that enable improved analysis and stronger security…
Incident Response Reports
Ransomware is no longer just a topic for conferences or polished slides. It is a concrete threat that stops real companies, halts production and puts entire business models at risk. To understand how devastating an…
In recent weeks, a company in Italy fell victim to a double ransomware compromise. This case demonstrates how the lack of a structured DFIR (Digital Forensics & Incident Response) approach can lead to a second…
In the world of cybersecurity, incident response is a crucial process that requires precision and expertise. A significant example of an effective intervention by Cyberoo Incident Response Team is the case of a well-known consultancy…
Infostealers: silent thieves in the digital world Infostealers are a particularly insidious type of malware, designed to steal personal and sensitive information stealthily and often unnoticed. These malicious programmes operate in the background, collecting data…
Knowing how to read a log and recognizing a behavioral anomaly, especially on non-working days and times, will inevitably reduce the risk of impairment. Recently, Cyberoo’s Incident Response team was engaged after a total Ransomware…
We often talk about data protection and how to protect against exfiltration as malware and ransomware attacks of different types continue to proliferate. Nevertheless, the reality is that companies are still doing too little. Cyberoo’s…
The statistics speak for themselves: the increase in ransomware attacks turns out to be across different organizations, regardless of their industry. This phenomenon can be attributed to several factors, including lack of adequate investment in…
It often happens to work with companies that have signed contracts with ICT service providers that turn out to be inefficient when needed. In today’s business environment, Cybersecurity management must be configured as a multidimensional…
It is common to have to deal with IT incidents and be faced with undesirable situations, not because of the type or severity of the incident, but rather because of the lack of organization of…
Recently, a company in northern Italy was victim of a serious cyber attack that resulted in the compromise of its infrastructure and the interruption of operations. The perpetrators of the malicious attack gained unauthorized access…