Explore the world
of Cybersecurity

  • Direttive UE

    DORA regulation and the TLPT testing methodology

    The European DORA Regulation marks a turning point for the financial sector, introducing stringent requirements to ensure digital operational resilience and the ability to effectively manage cyber incidents. Among the new features, Delegated Regulation (EU) 2025/1190 defines the technical and methodological standards for the adoption of Threat-Led Penetration Testing (TLPT), reinforcing the structured approach to security testing based on real threats.

  • Direttive UE

    NIS2 and 2026 deadlines: why offensive security has become a strategic requirement

    Il 2026 è un punto di svolta per la Direttiva NIS2: da quest'anno entrano pienamente in vigore gli obblighi operativi, i controlli dell’Autorità e le prime verifiche sul livello reale di sicurezza delle organizzazioni. L'Offensive Security è lo strumento chiave per dimostrare conformità e resilienza.

  • Case Study

    Physical Red Teaming: Betrusted it is not only digital, but also physical

    In this case study, we will tell you how we organised Physical Red Teaming activities at the ACME company buildings located in the centre of Clerville.

  • Application security - Case Study

    Red Teaming LLMs with Evolving Prompts

    LLM attacks taxonomy When approaching the offensive security side of large language models, three terms frequently surface: prompt injection, jailbreak, and evasion. They’re most often used interchangeably, but they actually describe distinct attacker goals and also rely on different Tactics, Techniques and Procedures (TTPs). Understanding the differences is essential both for building secure systems and […]

  • Direttive UE

    Betrusted obtains ISO 27001 certification

    We are proud to announce that on 17 July 2025, we obtained ISO 27001 certification, the international standard that defines best practices for information security management.

  • Case Study - Phishing

    How we bypassed a popular email threats protection solution

    In this article we describe how we bypassed a popular Email Threat Protection solution using phishing techniques that exploited the limitations of AS Patterns.

  • Penetration Test

    When Java Web Start won’t listen: bending a JNLP app to your proxy

    Pentesting isn’t always about sleek tools and shiny APIs. I recently faced a legacy Java Web Start app hidden behind a VPN-accessed PAM portal—and it flat-out ignored all my proxy settings. Neither JVM flags nor OS-level variables worked, and to make matters worse, it was running on Windows. By forcing proxy usage at the socket level and decoding both Fast Infoset and Java-serialized SOAP, I managed to break through the layers and uncover serious client-side trust flaws.

  • Application security - Direttive UE - EU Directives

    NIS2 Directive: The Second Phase of the Implementation Process Begins

    On April 10, 2025, the National Cybersecurity Agency (NCA) launched the second phase of the NIS2 Directive implementation process, notifying organizations that registered in the first phase of the classification assigned to them.Based on over 30,000 registrations, NCA identified more than 20,000 organizations in Italy as NIS entities. Among them, over 5,000 have been classified as essential entities.In this article, I’ll clarify the notifications, what they contain, and the timelines for the organizations involved.

Discover how we can help you

Together, we’ll find the best solutions to tackle the challenges your business faces every day.