The National Security 2020 document was published, relating to the action of Italian intelligence. Since its first edition in 2007, this report has been available on the national intelligence website and provides a clear analysis of the threats to security on the ground.

The report is divided into eight chapters, two of which are of direct interest to the IT world: the cyber threat, but also the hybrid one, understood as using the web to create disinformation. In addition, there is also an annex on cyber protection.

COVID emergency

It is highlighted that, as on other fronts, also that of the Cyber ​​threat has been considerably conditioned by the COVID emergency, prompting the sector to bring a significant part of its commitment towards the containment of hostile projects, both of a state and hacktivist matrix or criminal.

Intelligence also warns against attacks by foreign speculators against companies suffering from the health emergency. The numerical analysis of cyber attacks revealed a general increase of 20%, seeing the main increase in attacks against the public sector, specifically against local administrations.

Attack techniques

Use of Scanning techniques with subsequent use of SQL injection is confirmed to be prevalent

With regard to attack techniques, the use of Scanning techniques with subsequent use of SQL injection is confirmed to be prevalent.

Phishing campaigns with the aim of installing malicious software remain numerically much lower but very dangerous. Even the dreaded ransomware have had the opportunity to exploit the new weaknesses introduced by smartworking to target various subjects both in the healthcare sector and in the national industry.

Hybrid threat

As for the chapter on the hybrid threat of the document, it is highlighted how Italy has been hit by disinformation campaigns aimed at creating a long-term strategic advantage for the authors of these, all by exploiting the inability of algorithms of social networks to verify the reliability of the news but also the algorithm system based on the user's gratification that leads him to an effective disinformation bubble.

Download PDF version Download PDF version

In case you missed it

Genetec innovations transform MENA security at Intersec 2025
Genetec innovations transform MENA security at Intersec 2025

Genetec Inc., the global pioneer in enterprise physical security software, will demonstrate the latest innovations in advanced physical security solutions designed to meet the regi...

2024 was a big year for M&A in the security market
2024 was a big year for M&A in the security market

Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Ann...

Enhancing collaboration in physical security operations
Enhancing collaboration in physical security operations

In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to inter...

Quick poll
What is the most significant challenge facing smart building security today?