Note to the reader
First of all thank you for visiting the English version of the website edoardolimone.com. The site has over 470 articles that deal with cybersecurity, artificial intelligence, digitization. Translating all the material takes a lot of time and for this reason not all the content has been translated into other languages. It is a gradual process that aims to safeguard quality and costs. If an article of interest has not yet been translated, please be patient or, in the meantime, use one of the online translators.
Thank you for your patience and trust.
Edoardo Limone

Insight: Holy League
The Holy League is a cybergang involved in many socially motivated offensives: the main purpose of the Holy League is to protect certain Christian values. The Holy League is supposedly

Insight: Sylhet Gang
The Sylhet Gang collective (also SG) has been involved in numerous cyber offensives such as the famous #OpIsrael and the even more famous #OpFreePalestine. It has very clear pro-Palestinian connotations

Insight: Mr Hamza
This is a fact sheet on the collective called Mr Hamza, which has been involved in numerous cyber attacks, including in collaboration with DieNet, discussed here.

Cyber domination in the war between Israel and Iran
The protracted war between Israel and Iran has also been characterised, predictably, by actions carried out on the cyber level. Let us try to delve into some of them in

Data breach: Municipality of Pisa
The Municipality of Pisa was subject to a data breach by the NOVA collective. Let us try to understand what happened and the consequences of this action.

The ACN case and ‘cyber-dignity’
If you want, you can call it that, because in recent years it can be said that anything has become‘cyber‘; with the help of market opportunities and the ‘fashion’ of

The no data centre movement
As anyone interested in technology is well aware by now, there is a serious competitiveness problem in Europe compared to countries such as the U.S. and China. In Italy, in

From NIS 2 to Today: Failure and Opportunity
NIS 2 came into force in Italy on 16 October 2024, following transposition through Legislative Decree No. 138 of 4 September 2024, published in the Official Gazette on 1 October

Between data breaches and embarrassing communications
A few months after the entry into force of NIS 2, security shortcomings continue to be found in many commercial sectors that are impacted by the European Directive and beyond;

War and Peace: I.A. in warfare
The purpose of this article is to reflect on how artificial intelligence can be used in a war context and subsequently introduced into a civil operational environment.

Contracts and artificial intelligence
The purpose of this article is to suggest a simple and functional approach to cataloguing the risks arising from the implementation of artificial intelligence within organisations.

Risk Management and Artificial Intelligence
The purpose of this article is to show the evolution of ISO 27005, to present a compatible and alternative methodological paradigm for cyber risk management, and to observe some of

The Culture of Safety – Part 2
Italy is facing an increasing number of cyber threats both in quantity and complexity, yet there seems to be no equally effective evolution in terms of cybersecurity. Let us try

CIRAS: tracking cyber incidents in Europe
The European Union has an IT incident analysis tool called CIRAS. Let’s take a look at this not always well known tool.

The future of Europe and the world
In these hours stadium choruses are rising on social networks for and against the self-styled agreement with Elon Musk’s Space X company, wanted by Prime Minister Giorgia Meloni.

Cyber Anti-Sec 2024
Welcome to the ‘Cyber Anti-Sec’ security report covering the year 2024, in which the most relevant data, trends and data breaches will be analysed.

Data breach: AIAD
AIAD is the Federation, member of Confindustria, representing Italian Aerospace, Defence and Security Companies.

Data breach: INPS Servizi S.p.A.
The company INPS Servizi S.p.A. was the subject of a data breach by the LYNX collective, with data exfiltration and interruption of services. Let’s find out more.

NIS 2: General Considerations
NIS 2 is bringing a number of compliance activities by private companies and public administrations, sometimes not very consistent with the regulations. Let us try to make some reflections on

The culture of data management
The Equalize case is filling the front pages of the national press and is spreading like wildfire. On social media, it is being talked about in a very technical way,

Data breach Postel S.p.A.: the provision of the Garante
The newsletter of the Garante per la Protezione dei Dati Personali (Italian Data Protection Authority) publicises as news measure No. 572 of 4 July 2024 concerning the data breach suffered

NIS 2: a possible case of compulsive standardisation
On 17 October, Italy will transpose the NIS 2 Directive(CELEX EU 2022/2555), and the expectation surrounding this directive raises a doubt: will the directive have any real usefulness or have

The usefulness of technology
For a few months now, we have been beginning to read articles that seem to re-propose the importance of certain technologies that have been much talked about until now. Among

Cyber attacks in countries with low economic development
The idea that hackers only target the most industrially powerful countries is wrong; certainly the United States, China, Europe, are constantly at the centre of cyber attacks, but there are