Fabio Palozza

16 POSTS0 COMMENTS
Fabio is Technical Director EMEA-CALA, responsible for Systems Engineering in the theater. With a long experience, he began his career in software development for aerospace systems before getting into IT vendor ecosystem with Bay Networks/Nortel and Juniper Networks, up to being Technical Director EMEA for the Telecom, Cloud and Content businesses. Fabio writes about technology strategy, trends and implementation.

Evolving Cyberthreats: Enhance Your IT Security Mechanisms

For years, cybersecurity professionals across the globe have been highly alarmed by threats appearing in the form of malware, including Trojans, viruses, worms, and...

The Origin of Ransomware and Its Impact on Businesses

In previous articles we've mentioned how Ransomware has wreaked havoc, invading systems and putting organizations’ reputation and stability at stake. In this article, we’ll...

Top Cryptomining Malware. Top Ransomware.

In 2018, cryptominers have emerged as the leading attack vector used by cybercriminals to gain access into others systems. Cryptominers are getting advanced makeovers by...

Malicious Cryptocurrency Mining: The Road Ahead

As cryptomining continues to rule the cybercrime scenario, cybercriminals are designing innovative ways to drain people’s cryptowallets. Scammers are still doing their best to...

Raising the Bar for Ethical Cryptocurrency Mining

In our last article, we discussed how cybercriminals are launching drive-by mining attacks to gain access to people’s crypto-wallets. In this article, we will...

Drive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection

By the end of the last year, we saw a drastic rise in drive-by cryptocurrency mining activities and it is quite alarming to note...

Accessing Your Crypto Wallet Through Android Devices?

Android platforms are commonly characterized by the presence of Trojan-infected apps that have built-in cryptocurrency mining codes, which means that mobile users are highly...

The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

In my last article, I was discussing how malicious cryptocurrency mining is all set to exploit technological as well as human vulnerabilities this year....

Malicious Cryptocurrency Mining: The “Shooting Star” in the Cybercrime Domain

It’s quite evident how these days, attacks assume new forms along with transformations in the types of services that are widely used by consumers...

Detecting Malware/APT Through Automatic Log Analysis

Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the potential to evade even...