{"id":59098,"date":"2025-09-02T17:57:29","date_gmt":"2025-09-02T15:57:29","guid":{"rendered":"https:\/\/www.lexia.it\/?p=59098"},"modified":"2025-09-02T17:58:02","modified_gmt":"2025-09-02T15:58:02","slug":"rise-of-cybercrime","status":"publish","type":"post","link":"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/","title":{"rendered":"The rise of Cybercrime"},"content":{"rendered":"\n<p>According to the<em> Clusit 2025 Report<\/em>, in the last five years, Italy has seen a significant increase in cyberattacks. After the pandemic, cyber events have grown in both number (the monthly average rose from 156 in 2020 to 295 in 2024) and intensity<sup data-fn=\"f36181da-dcc6-434e-add6-64fc542262b4\" class=\"fn\"><a id=\"f36181da-dcc6-434e-add6-64fc542262b4-link\" href=\"#f36181da-dcc6-434e-add6-64fc542262b4\">1<\/a><\/sup>.<\/p>\n\n\n\n<p>The worsening of geopolitical tensions, linked to the ongoing Russia-Ukraine conflict and changes in Middle Eastern dynamics due to the Hamas attacks and Israel&#8217;s strong reaction, has contributed to a significant rise in cyber incidents in Italy. Between May and November 2024 alone, 1,193 cyber events were recorded, with particularly significant impacts on the public administration and university research sectors<sup data-fn=\"b68635a2-ca07-48c1-805c-4d53f28031ed\" class=\"fn\"><a id=\"b68635a2-ca07-48c1-805c-4d53f28031ed-link\" href=\"#b68635a2-ca07-48c1-805c-4d53f28031ed\">2<\/a><\/sup>.<\/p>\n\n\n\n<p>In an already complex context, new issues have emerged with the spread of generative artificial intelligence, which has become an effective tool in the hands of attackers to refine and intensify their illicit activities. The use of these new technologies has led to a proliferation of digital conflict, particularly through Distributed Denial of Service (DDoS) attacks.<\/p>\n\n\n\n<p>These types of cyberattacks have been carried out by hackers, criminal groups, and a growing number of activists targeting public institutions and private organizations, contributing to a general climate of uncertainty. Driven by political or social motives, <em>hacktivists <\/em>such as the famous<em> Anonymous<\/em> violate systems and leak sensitive data to denounce political or economic decisions deemed unjust or inequitable.<\/p>\n\n\n\n<p>In some cases, however, there has been a well-founded suspicion that foreign powers are behind such <em>\u201chacktivism\u201d<\/em> initiatives, aiming to create psychological warfare, disinformation, and systematic sabotage of the most vulnerable systems. Unfortunately, in this scenario marked by worrying instability, Italy remains among the countries most affected by cyberattacks<sup data-fn=\"a29b53da-8957-45e3-92a7-0a79686e15ba\" class=\"fn\"><a id=\"a29b53da-8957-45e3-92a7-0a79686e15ba-link\" href=\"#a29b53da-8957-45e3-92a7-0a79686e15ba\">3<\/a><\/sup>.<\/p>\n\n\n\n<p>The latest and most advanced monitoring techniques from the National Cybersecurity Agency (ACN) have succeeded in identifying the most frequent targets of these threats, pinpointing not only assets already at risk but also those potentially vulnerable. This has allowed previously unnoticed attacks, manipulations, and infiltrations in systems to come to light.<\/p>\n\n\n\n<p>But what exactly is cybercrime? This term generally refers to criminal activities that exploit the technical vulnerabilities of computer systems or the careless behavior of users, exposing them to risks of fraud, unauthorized access, or theft of sensitive data.<\/p>\n\n\n\n<p>Attacks are often carried out through <em>social engineering<\/em> techniques aimed at manipulating victims\u2019 behavior to disclose confidential information: for example, a hacker may impersonate an authoritative figure to gain access credentials, targeting particularly vulnerable individuals such as junior employees or administrative figures. Among the most common illicit activities is <em>phishing<\/em>, which involves sending misleading communications, often via email, to steal financial data or access codes.<\/p>\n\n\n\n<p>Alongside ordinary cybercrime, there is also cyberterrorism, which exploits the internet to spread violent ideologies, destabilize institutions, and generate fear, taking advantage of society\u2019s increasing dependence on online services. A notable case is the 2010 attack by the <em>Iranian Cyber Army<\/em>, which compromised the Chinese search engine Baidu.<\/p>\n\n\n\n<p>Cyber warfare, while similar in tactics, has different objectives, aiming to attack the enemy\u2019s critical infrastructure. The cyberspace has become a new battlefield for geopolitical confrontations, as evidenced by the significant case of <em>Stuxnet<\/em>, a worm <em>malware<\/em> designed (and deployed) to sabotage Iran&#8217;s nuclear facility.<\/p>\n\n\n\n<p><em>Malware<\/em>, <em>specifically<\/em>, represents the most sophisticated cyber weapon: malicious software designed to damage devices and computer networks. Among the most dangerous are <em>trojans<\/em>, which appear as legitimate applications but allow the attacker to take control of the infected device, and <em>ransomware<\/em>, which locks access to data and demands a ransom for its release.<\/p>\n\n\n\n<p>Large companies and public administrations are prime targets, as the consequences of losing sensitive data are often more severe than paying the demanded ransom.<\/p>\n\n\n\n<p>In the corporate world, protecting digital assets has become essential. An effective information risk management system involves identifying and assessing risks, measuring potential impact, and defining appropriate countermeasures. It is crucial to identify the most vulnerable business areas, strengthen existing protection systems, and, when appropriate, take out specific insurance coverage against cyber risks. However, adopting advanced technologies alone is not enough. Effective defense cannot disregard the training and awareness of staff: experience shows that the human factor represents the weakest link in the security chain. A workforce not adequately prepared for today\u2019s challenges can compromise even the most sophisticated technical systems.<\/p>\n\n\n\n<p>In conclusion, cyberspace has reshaped contemporary reality, offering extraordinary opportunities but also creating new classes of risk. Cybersecurity can no longer be seen as a technical option, but as a strategic priority: every public and private organization must develop strategies to identify potential attacks in a timely manner, react quickly, and mitigate damages, restoring the full operation of systems rapidly. Only in this way can we maximize the benefits of digital transformation while minimizing the associated risks and contributing to the overall security of the country.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"f36181da-dcc6-434e-add6-64fc542262b4\">Clusit Report on Cybersecurity in Italy and Worldwide <a href=\"#f36181da-dcc6-434e-add6-64fc542262b4-link\" aria-label=\"Jump to footnote reference 1\">\u21a9\ufe0e<\/a><\/li><li id=\"b68635a2-ca07-48c1-805c-4d53f28031ed\">ACN, <em>Operational Summary<\/em>, November 2024 <a href=\"#b68635a2-ca07-48c1-805c-4d53f28031ed-link\" aria-label=\"Jump to footnote reference 2\">\u21a9\ufe0e<\/a><\/li><li id=\"a29b53da-8957-45e3-92a7-0a79686e15ba\">Clusit Report on Cybersecurity in Italy and Worldwide <a href=\"#a29b53da-8957-45e3-92a7-0a79686e15ba-link\" aria-label=\"Jump to footnote reference 3\">\u21a9\ufe0e<\/a><\/li><\/ol>","protected":false},"excerpt":{"rendered":"<p>According to the Clusit 2025 Report, in the last five years, Italy has seen a significant increase in cyberattacks. After the pandemic, cyber events have grown in both number (the monthly average rose from 156 in 2020 to 295 in 2024) and intensity1. The worsening of geopolitical tensions, linked to the ongoing Russia-Ukraine conflict and &hellip; <a href=\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/\">Continued<\/a><\/p>\n","protected":false},"author":13,"featured_media":59186,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":"[{\"content\":\"Clusit Report on Cybersecurity in Italy and Worldwide\",\"id\":\"f36181da-dcc6-434e-add6-64fc542262b4\"},{\"content\":\"ACN, <em>Operational Summary<\/em>, November 2024\",\"id\":\"b68635a2-ca07-48c1-805c-4d53f28031ed\"},{\"content\":\"Clusit Report on Cybersecurity in Italy and Worldwide\",\"id\":\"a29b53da-8957-45e3-92a7-0a79686e15ba\"}]"},"categories":[665],"tags":[],"area":[625],"collana":[],"competenza":[628],"class_list":["post-59098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publications","area-law-en","competenza-white-collar-crimes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The rise of Cybercrime - LEXIA<\/title>\n<meta name=\"description\" content=\"The Clusit 2025 Report highlights the increase in cyberattacks in Italy, including geopolitical threats and generative AI.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The rise of Cybercrime - LEXIA\" \/>\n<meta property=\"og:description\" content=\"The Clusit 2025 Report highlights the increase in cyberattacks in Italy, including geopolitical threats and generative AI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"LEXIA\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-02T15:57:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-02T15:58:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lexia.it\/wp-content\/uploads\/2025\/09\/ascesa-dei-cybercrime-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christian\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christian\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/\",\"url\":\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/\",\"name\":\"The rise of Cybercrime - LEXIA\",\"isPartOf\":{\"@id\":\"https:\/\/www.lexia.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lexia.it\/wp-content\/uploads\/2025\/09\/ascesa-dei-cybercrime-1.png\",\"datePublished\":\"2025-09-02T15:57:29+00:00\",\"dateModified\":\"2025-09-02T15:58:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.lexia.it\/#\/schema\/person\/91f22c316f63e9d080a0fb814a34db5b\"},\"description\":\"The Clusit 2025 Report highlights the increase in cyberattacks in Italy, including geopolitical threats and generative AI.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/#primaryimage\",\"url\":\"https:\/\/www.lexia.it\/wp-content\/uploads\/2025\/09\/ascesa-dei-cybercrime-1.png\",\"contentUrl\":\"https:\/\/www.lexia.it\/wp-content\/uploads\/2025\/09\/ascesa-dei-cybercrime-1.png\",\"width\":1920,\"height\":1080,\"caption\":\"rise-of-cybercrime\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lexia.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The rise of Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lexia.it\/#website\",\"url\":\"https:\/\/www.lexia.it\/\",\"name\":\"LEXIA\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lexia.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lexia.it\/#\/schema\/person\/91f22c316f63e9d080a0fb814a34db5b\",\"name\":\"Christian\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lexia.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/470a76d7f2151b16bedeed55f5eaef104b54eeda7aeeee817ff29f1aa1798415?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/470a76d7f2151b16bedeed55f5eaef104b54eeda7aeeee817ff29f1aa1798415?s=96&d=mm&r=g\",\"caption\":\"Christian\"},\"url\":\"https:\/\/www.lexia.it\/en\/author\/christian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The rise of Cybercrime - LEXIA","description":"The Clusit 2025 Report highlights the increase in cyberattacks in Italy, including geopolitical threats and generative AI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"The rise of Cybercrime - LEXIA","og_description":"The Clusit 2025 Report highlights the increase in cyberattacks in Italy, including geopolitical threats and generative AI.","og_url":"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/","og_site_name":"LEXIA","article_published_time":"2025-09-02T15:57:29+00:00","article_modified_time":"2025-09-02T15:58:02+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.lexia.it\/wp-content\/uploads\/2025\/09\/ascesa-dei-cybercrime-1.png","type":"image\/png"}],"author":"Christian","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christian","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/","url":"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/","name":"The rise of Cybercrime - LEXIA","isPartOf":{"@id":"https:\/\/www.lexia.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lexia.it\/wp-content\/uploads\/2025\/09\/ascesa-dei-cybercrime-1.png","datePublished":"2025-09-02T15:57:29+00:00","dateModified":"2025-09-02T15:58:02+00:00","author":{"@id":"https:\/\/www.lexia.it\/#\/schema\/person\/91f22c316f63e9d080a0fb814a34db5b"},"description":"The Clusit 2025 Report highlights the increase in cyberattacks in Italy, including geopolitical threats and generative AI.","breadcrumb":{"@id":"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/#primaryimage","url":"https:\/\/www.lexia.it\/wp-content\/uploads\/2025\/09\/ascesa-dei-cybercrime-1.png","contentUrl":"https:\/\/www.lexia.it\/wp-content\/uploads\/2025\/09\/ascesa-dei-cybercrime-1.png","width":1920,"height":1080,"caption":"rise-of-cybercrime"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lexia.it\/en\/2025\/09\/02\/rise-of-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lexia.it\/en\/"},{"@type":"ListItem","position":2,"name":"The rise of Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.lexia.it\/#website","url":"https:\/\/www.lexia.it\/","name":"LEXIA","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lexia.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.lexia.it\/#\/schema\/person\/91f22c316f63e9d080a0fb814a34db5b","name":"Christian","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lexia.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/470a76d7f2151b16bedeed55f5eaef104b54eeda7aeeee817ff29f1aa1798415?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/470a76d7f2151b16bedeed55f5eaef104b54eeda7aeeee817ff29f1aa1798415?s=96&d=mm&r=g","caption":"Christian"},"url":"https:\/\/www.lexia.it\/en\/author\/christian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/posts\/59098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/comments?post=59098"}],"version-history":[{"count":6,"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/posts\/59098\/revisions"}],"predecessor-version":[{"id":59192,"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/posts\/59098\/revisions\/59192"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/media\/59186"}],"wp:attachment":[{"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/media?parent=59098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/categories?post=59098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/tags?post=59098"},{"taxonomy":"area","embeddable":true,"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/area?post=59098"},{"taxonomy":"collana","embeddable":true,"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/collana?post=59098"},{"taxonomy":"competenza","embeddable":true,"href":"https:\/\/www.lexia.it\/en\/wp-json\/wp\/v2\/competenza?post=59098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}