<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.ucci.it/publications/</loc><lastmod>2026-02-21T17:29:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.ucci.it/2026/01/28/generative-ai-creativity-vs-knowledge/</loc><lastmod>2026-01-28T07:25:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2026/01/21/voidlink-evidence-that-the-era-of-advanced-ai-generated-malware-has-begun-by-check-point-research/</loc><lastmod>2026-01-21T07:34:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/profile/</loc><lastmod>2026-01-17T16:56:09+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.ucci.it/contacts/</loc><lastmod>2026-01-17T16:55:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.ucci.it/about-2/</loc><lastmod>2026-01-17T16:54:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.ucci.it/2026/01/10/are-ai-coding-assistants-declining-in-quality/</loc><lastmod>2026-01-10T16:14:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2025/12/07/securing-the-ai-software-development-tools-idesaster/</loc><lastmod>2025-12-07T09:13:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2025/05/10/the-bizarre-case-involving-chatgpt-a-divorce-and-coffee-cups-reading/</loc><lastmod>2025-05-10T09:29:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2025/05/08/ai-and-security-bug-bounty/</loc><lastmod>2025-05-08T16:12:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2025/05/07/artificial-intelligence-and-artificial-science/</loc><lastmod>2025-05-07T12:06:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2025/04/28/llms-still-not-so-good-at-math-reasoning/</loc><lastmod>2025-04-28T12:44:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2025/04/10/anthropic-reasoning-models-dont-always-say-what-they-think/</loc><lastmod>2025-04-10T08:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2025/04/09/ai-and-professional-work/</loc><lastmod>2025-04-09T06:30:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/12/03/image-recognition-and-advanced-driving-assistance/</loc><lastmod>2024-12-01T14:16:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/11/26/on-password-policy-history/</loc><lastmod>2024-11-24T15:13:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/11/24/quantum-computers-and-error-correction-mitigation/</loc><lastmod>2024-11-24T14:15:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/10/07/is-the-reliability-of-llms-improving-with-their-dimension/</loc><lastmod>2024-10-07T19:25:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/09/29/passwords-requirements-in-the-new-nist-sp-800-63-digital-identity-guidelines/</loc><lastmod>2024-09-29T10:13:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/09/05/a-roadmap-to-enhancing-internet-routing-security/</loc><lastmod>2024-09-05T17:34:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/08/24/a-quantum-computers-status-update/</loc><lastmod>2024-08-24T10:37:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/07/14/the-first-world-quantum-readiness-day-september-26-2024/</loc><image:image><image:loc>https://blog.ucci.it/wp-content/uploads/2024/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-07-14T14:40:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/04/22/cryptanalysis-hard-lattice-problems-and-post-quantum-cryptography/</loc><lastmod>2024-04-22T18:10:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/01/02/is-quantum-computing-harder-than-expected/</loc><lastmod>2024-04-02T15:34:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/04/02/what-can-be-done-with-the-quantum-computers-we-can-build/</loc><lastmod>2024-04-02T15:33:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/03/03/a-morris-worm-for-generative-artificial-intelligence/</loc><lastmod>2024-03-03T16:07:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/02/25/latest-ai-models-can-autonomously-hack-websites/</loc><lastmod>2024-02-25T16:36:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/02/04/hardware-based-fully-homomorphic-encryption/</loc><lastmod>2024-02-04T11:43:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/01/28/a-new-open-source-competitor-in-the-large-language-ai-models-arena/</loc><lastmod>2024-01-28T14:36:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/01/26/on-deceptive-large-language-ai-models/</loc><lastmod>2024-01-26T17:02:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2024/01/22/writing-in-secure-code-with-ai-assistance/</loc><lastmod>2024-01-22T16:50:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/12/17/is-the-turing-test-dead/</loc><lastmod>2023-12-17T16:29:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/12/10/error-suppression-for-quantum-computers/</loc><lastmod>2023-12-10T18:41:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/11/01/on-open-source-software-and-the-proposed-eu-cyber-resilience-act/</loc><lastmod>2023-12-10T17:14:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/11/30/more-weaknesses-of-large-language-models/</loc><lastmod>2023-11-30T19:43:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/11/01/new-us-executive-order-on-artificial-intelligence/</loc><lastmod>2023-11-01T10:56:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/10/29/ai-transparency-not-doing-so-well/</loc><lastmod>2023-10-29T17:31:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/10/08/cheating-people-vs-cheating-ai-models/</loc><lastmod>2023-10-08T14:55:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/10/07/quantum-computers-are-getting-smaller/</loc><lastmod>2023-10-07T14:39:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/09/25/post-quantum-cryptography-on-the-rise/</loc><lastmod>2023-09-25T18:25:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/06/26/compliance-of-foundation-ai-model-providers-with-draft-eu-ai-act/</loc><lastmod>2023-06-26T06:47:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/05/31/ai-and-the-extinction-of-the-human-race/</loc><lastmod>2023-05-31T06:42:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/05/14/on-large-language-models-and-ai-models-explainability/</loc><lastmod>2023-05-14T14:30:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/05/03/windows-code-and-rust/</loc><lastmod>2023-05-03T06:50:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/03/14/intelligenza-artificiale-un-approccio-alla-gestione-dei-rischi-per-le-aziende/</loc><lastmod>2023-03-14T16:25:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2023/02/02/sicurezza-informatica-spunti-ed-approfondimenti/</loc><lastmod>2023-02-02T16:55:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/09/11/nsa-and-post-quantum-cryptography/</loc><lastmod>2022-09-11T15:22:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/09/11/on-cryptographic-agility/</loc><lastmod>2022-09-11T15:18:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/08/04/post-quantum-cryptography-is-not-doing-so-well/</loc><lastmod>2022-08-04T06:55:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/06/23/again-on-implementing-cryptography/</loc><lastmod>2022-06-23T16:18:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/06/20/cryptography-is-still-difficult-to-implement/</loc><lastmod>2022-06-20T09:52:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/05/09/to-password-or-not-to-password/</loc><lastmod>2022-05-09T15:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/05/08/is-post-quantum-crypto-going-mainstream-part-3/</loc><lastmod>2022-05-08T14:44:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/04/14/is-post-quantum-crypto-going-mainstream-part-2/</loc><lastmod>2022-04-14T14:11:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/04/10/is-post-quantum-crypto-going-mainstream/</loc><lastmod>2022-04-10T10:50:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/03/31/defeating-mfa-with-mfa-prompt-bombing/</loc><lastmod>2022-03-31T15:45:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/02/20/cisa-list-of-free-cybersecurity-services-and-tools/</loc><lastmod>2022-02-20T16:03:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/02/09/towards-web-3-but-first-what-is-it/</loc><lastmod>2022-02-09T19:03:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/01/31/managing-security-in-the-clouds/</loc><lastmod>2022-01-31T19:04:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2022/01/09/fixing-cryptography-is-not-always-easy/</loc><lastmod>2022-01-09T16:11:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/12/05/cisa-catalogue-of-known-and-exploited-vulnerabilities/</loc><lastmod>2021-12-05T15:24:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/11/22/again-social-engineering-and-fraud/</loc><lastmod>2021-11-22T07:54:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/09/22/on-ai-ml-failures/</loc><lastmod>2021-09-22T06:59:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/09/02/nsa-faqs-on-quantum-computing-and-post-quantum-cryptography/</loc><lastmod>2021-09-02T17:06:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/09/02/risks-of-cryptography/</loc><lastmod>2021-09-02T15:37:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/08/31/solar-superstorms-and-it-bc-dr/</loc><lastmod>2021-08-31T17:59:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/08/23/on-evil-maid-attacks-and-remote-working/</loc><lastmod>2021-08-23T15:25:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/08/17/from-dns-attacks-to-input-validation-and-zero-trust/</loc><lastmod>2021-08-17T14:50:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/06/15/apple-private-relay-is-tor-going-mainstream/</loc><lastmod>2021-06-15T18:23:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/05/12/brief-on-ai-ml/</loc><lastmod>2021-05-12T05:56:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/04/22/passwordless-authentication/</loc><lastmod>2021-04-22T16:15:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/04/11/more-side-channel-attacks/</loc><lastmod>2021-04-11T16:51:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/03/21/online-tracking-and-the-end-of-third-party-cookies/</loc><lastmod>2021-03-21T16:17:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/01/09/hardware-vulnerability-of-some-fido-u2f-keys/</loc><lastmod>2021-01-09T17:50:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/24/diverting-and-tampering-with-internet-traffic/</loc><lastmod>2021-01-05T14:03:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/10/09/more-thougths-on-maintenance-updates-and-fixing/</loc><lastmod>2021-01-05T14:01:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2021/01/04/news-on-fully-homomorphic-encryption/</loc><lastmod>2021-01-04T19:39:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/12/21/atp-attacks-and-single-point-of-failure/</loc><lastmod>2020-12-21T11:25:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/12/18/malware-ransomware-co/</loc><lastmod>2020-12-18T16:11:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/12/02/mixed-results-on-ai-ml-from-google/</loc><lastmod>2020-12-02T08:05:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/10/24/patch-now-or/</loc><lastmod>2020-10-24T12:52:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/09/27/thoughts-on-blue-red-purple-teams-and-defending-from-targeted-attacks/</loc><lastmod>2020-09-27T15:04:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/09/15/another-example-of-how-implementing-cryptography-is-tricky-and-a-score-10-cve/</loc><lastmod>2020-09-15T06:26:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/09/09/zero-trust-and-dynamical-perimeters-based-on-identity/</loc><lastmod>2020-09-09T13:30:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/08/11/subject-matter-experts-on-artificial-intelligence-and-it-crime/</loc><lastmod>2020-08-11T13:42:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/07/12/phishing-in-the-clouds/</loc><lastmod>2020-07-12T09:29:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/07/08/using-a-dnssec-upgrade-as-a-phishing-means-to-steal-administrative-credentials/</loc><lastmod>2020-07-08T06:19:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/06/21/always-about-security-patching-and-updates/</loc><lastmod>2020-06-21T15:42:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/06/14/patching-updating-again-and-ca-certificates/</loc><lastmod>2020-06-14T15:32:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/06/02/security-and-cryptography-do-not-always-go-hand-in-hand-with-availability/</loc><lastmod>2020-06-02T14:57:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/05/27/on-the-latest-bluetooth-impersonation-attack/</loc><lastmod>2020-05-27T19:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/05/18/whatss-happening-in-cyber-it-security/</loc><lastmod>2020-05-18T14:56:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/04/24/information-science-common-sense-and-fake-news/</loc><lastmod>2020-04-24T16:44:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/04/11/cryptography-for-a-covid-19-contact-tracing-app-by-apple-and-google/</loc><lastmod>2020-04-11T15:10:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/04/04/perception-of-it-security-in-times-of-crisis/</loc><lastmod>2020-04-04T12:06:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/02/26/hacking-satellites/</loc><lastmod>2020-02-26T14:42:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/02/07/from-light-bulbs-to-it-takeover/</loc><lastmod>2020-02-07T08:07:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/02/02/cacheout-another-speculative-execution-attack-to-cpus/</loc><lastmod>2020-02-02T10:29:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/01/30/trust-on-online-information-fake-news-and-the-information-operations-kill-chain/</loc><lastmod>2020-01-30T08:51:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/01/18/privacy-news-not-so-good/</loc><lastmod>2020-01-18T17:59:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2020/01/12/another-nail-in-the-coffin-of-sha1-2/</loc><lastmod>2020-01-12T11:04:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/11/24/cloud-network-security-and-sase/</loc><lastmod>2019-11-24T16:04:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/09/08/privacy-and-vpn-routers-for-personal-security/</loc><lastmod>2019-09-08T10:53:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/09/04/recent-ransomware-attacks-and-the-value-of-information/</loc><lastmod>2019-09-04T14:01:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/06/01/a-red-cross-report-on-cyber-attacks/</loc><lastmod>2019-06-01T14:37:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/05/12/another-nail-in-the-coffin-of-sha1/</loc><lastmod>2019-05-12T10:20:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/05/12/lettera-a-un-terrapiattista-di-luciano-maiani-accademia-dei-lincei/</loc><lastmod>2019-05-12T09:16:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/05/05/patching-timing-is-getting-tight/</loc><lastmod>2019-05-05T10:46:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/04/13/the-evolution-of-dns/</loc><lastmod>2019-04-13T15:45:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/03/17/on-firefox-send/</loc><lastmod>2019-03-17T14:37:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/03/03/recent-results-on-information-and-security/</loc><lastmod>2019-03-03T15:32:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/02/24/hardware-enclaves-and-security/</loc><lastmod>2019-02-24T15:15:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/02/01/nist-announces-second-round-of-post-quantum-cryptography-standardization/</loc><lastmod>2019-02-01T08:40:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/01/20/a-new-theoretical-result-on-the-learnability-of-machine-learning-ai/</loc><lastmod>2019-01-20T14:52:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2019/01/02/like-a-movie-plot-the-3ve-defrauding-scheme/</loc><lastmod>2019-01-02T17:10:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2018/12/09/autocad-malware/</loc><lastmod>2018-12-09T14:53:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2018/12/01/da-multics-a-meltdown-e-spectre/</loc><lastmod>2018-12-01T17:34:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2018/01/04/meltdown-and-spectre-bugs-should-help-improve-it-security/</loc><lastmod>2018-01-04T15:12:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/11/19/on-data-breaches-phishing-or-malware/</loc><lastmod>2017-11-19T12:23:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/11/05/iphone-x-and-science-fiction/</loc><lastmod>2017-11-05T11:17:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/10/10/rowhammer-sgx-and-it-security/</loc><lastmod>2017-10-10T13:18:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/09/14/complexity-abstraction-and-security/</loc><lastmod>2017-09-14T13:18:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/06/08/a-practical-look-into-gdpr-for-it-final-part-3/</loc><lastmod>2017-06-08T16:03:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/05/17/on-manufacturing-iots-and-it-security/</loc><lastmod>2017-05-17T06:44:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/05/14/wannacry/</loc><lastmod>2017-05-14T14:39:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/05/14/business-email-compromise-ceo-frauds-friends/</loc><lastmod>2017-05-14T13:25:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/05/10/a-practical-look-into-gdpr-for-it-part-2/</loc><lastmod>2017-05-10T18:41:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/03/30/a-practical-look-into-gdpr-for-it/</loc><lastmod>2017-05-10T18:40:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/04/19/on-non-malware-fileless-attacks/</loc><lastmod>2017-04-19T13:48:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/04/18/is-it-truly-impossible-to-separate-vm-running-on-the-same-hw/</loc><lastmod>2017-04-18T16:58:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/03/20/cloud-security-and-hw-security-features/</loc><lastmod>2017-03-20T15:37:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/03/02/on-sha1-software-development-and-security/</loc><lastmod>2017-03-02T17:26:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2017/01/11/hardware-vulnerabilities-again-cloud-and-mobile-security/</loc><lastmod>2017-01-11T13:32:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/10/27/on-denial-of-service-attacks-and-hardware-vulnerabilities/</loc><lastmod>2016-10-27T08:04:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/10/16/on-the-security-of-modern-cryptography/</loc><lastmod>2016-10-16T14:02:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/09/28/yahoo-breach-and-gdpr/</loc><lastmod>2016-09-28T17:37:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/07/13/the-eus-network-and-information-security-nis-directive/</loc><lastmod>2016-07-13T07:29:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/07/10/new-developments-in-cryptography/</loc><lastmod>2016-07-10T11:49:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/07/03/how-secure-are-the-products-of-the-it-security-industry/</loc><lastmod>2016-07-03T14:47:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/07/03/implementing-cryptography-right-is-hard/</loc><lastmod>2016-07-03T14:31:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/06/03/on-hardware-backdoors/</loc><lastmod>2016-06-21T08:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/05/26/it-security-in-the-brave-new-world-of-agile-and-devops/</loc><lastmod>2016-05-26T13:32:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/05/25/record-high-number-of-phishing-attacks-in-q1-2016/</loc><lastmod>2016-05-25T07:07:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/05/10/on-a-kernel-backdoor-and-it-security/</loc><lastmod>2016-05-10T13:17:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/04/21/monitoring-outgoing-traffic-to-detect-intrusions/</loc><lastmod>2016-04-21T06:43:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/04/19/hacking-your-phone-from-60-minutes/</loc><lastmod>2016-04-19T06:06:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/04/11/ntia-request-for-comment-on-iot-policies/</loc><lastmod>2016-04-11T07:18:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/02/14/it-security-programme-cheat-sheet/</loc><lastmod>2016-02-14T11:52:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/02/10/gsma-and-security-of-iot/</loc><lastmod>2016-02-10T13:50:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/01/26/on-the-privacy-of-webcams-and-security-of-iots/</loc><lastmod>2016-01-26T14:31:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/01/18/marketing-and-internet-surveillance/</loc><lastmod>2016-01-18T06:58:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2016/01/14/it-security-human-behaviour-and-normalization-of-deviance/</loc><lastmod>2016-01-14T09:53:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2015/12/20/writing-software-and-security-bugs/</loc><lastmod>2015-12-20T13:20:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2015/11/29/one-of-the-first-examples-of-iot-and-security-risks/</loc><lastmod>2015-11-29T15:49:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2015/11/21/homomorphic-encryption-and-trusting-the-clouds/</loc><lastmod>2015-11-21T10:47:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2015/11/15/it-projects-and-failures/</loc><lastmod>2015-11-15T15:37:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2015/10/27/cryptography-is-too-risky-should-we-use-something-else-to-secure-it-systems/</loc><lastmod>2015-10-27T08:48:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2015/09/25/the-opm-hack-and-biometric-authentication/</loc><lastmod>2015-09-25T09:09:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2015/09/23/a-new-dress-for-my-website-and-thoughts-on-net-sociality/</loc><lastmod>2015-09-24T08:16:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2015/09/11/on-ashley-madison-passwords-crack/</loc><lastmod>2015-09-11T07:55:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2015/02/11/a-new-ransomware-kind-of-attack/</loc><lastmod>2015-02-11T17:41:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2015/02/11/it-security-and-cars-and-the-iot-world/</loc><lastmod>2015-02-11T17:26:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/10/08/why-the-bash-shellshock-bug-is-so-threatening/</loc><lastmod>2014-10-08T15:04:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/09/16/on-electromagnetic-attacks/</loc><lastmod>2014-09-16T15:45:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/06/12/on-cryptolocker-and-the-like/</loc><lastmod>2014-06-18T16:59:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/06/02/a-new-approach-to-quantum-random-number-generators-and-news-on-quantum-cryptography/</loc><lastmod>2014-06-02T18:30:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/06/02/game-over-zeus-and-banking-malware/</loc><lastmod>2014-06-02T17:22:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/06/02/hacking-atms/</loc><lastmod>2014-06-02T16:36:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/06/02/human-factor-is-always-the-weakest-point/</loc><lastmod>2014-06-02T16:28:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/04/27/some-considerations-on-heartbleed/</loc><lastmod>2014-04-27T16:05:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/02/09/on-target-and-other-breaches/</loc><lastmod>2014-02-09T11:05:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/01/13/home-banking-mobile-apps-unsecure-at-any-speed/</loc><lastmod>2014-01-13T16:17:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/01/13/hubble-amazing-pictures-of-newborn-stars/</loc><lastmod>2014-01-13T16:07:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2014/01/12/new-year-old-bug/</loc><lastmod>2014-01-12T21:08:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/12/23/side-channel-cryptanalysis/</loc><lastmod>2013-12-23T11:49:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/12/23/how-not-to-use-security-tools/</loc><lastmod>2013-12-23T11:34:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/12/15/more-news-about-authentication-and-passwords/</loc><lastmod>2013-12-15T16:57:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/12/01/on-d-wave-and-quantum-computing/</loc><lastmod>2013-12-01T17:05:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/27/how-to-abuse-your-customers/</loc><lastmod>2013-11-27T14:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/27/managing-a-large-ict-implementation-is-hard/</loc><lastmod>2013-11-27T13:53:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/24/internet-privacy-and-televisions/</loc><lastmod>2013-11-24T16:56:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/17/a-new-way-of-authenticating-yourself/</loc><lastmod>2013-11-17T12:46:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/17/interesting-linux-backdoor/</loc><lastmod>2013-11-17T12:20:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/17/cyber-readiness-index-of-countries/</loc><lastmod>2013-11-17T12:12:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/17/good-bye-rc4-and-sha-1/</loc><lastmod>2013-11-17T11:57:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/03/enisa-publishes-guidelines-on-the-use-of-cryptography/</loc><lastmod>2013-11-03T16:57:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/03/news-of-the-week/</loc><lastmod>2013-11-03T16:49:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/11/03/happy-birthday-morris-worm/</loc><lastmod>2013-11-03T16:28:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/10/27/linkedin-intro-duces-intro/</loc><lastmod>2013-10-27T21:17:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/10/27/will-tablets-kill-desktop-pcs/</loc><lastmod>2013-10-27T21:07:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/10/20/social-engineering-password-reset-and-dns-hijack/</loc><lastmod>2013-10-20T16:54:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/10/20/physical-security-and-atm-withdrawls/</loc><lastmod>2013-10-20T16:32:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/10/13/device-fingerprinting-and-user-tracking/</loc><lastmod>2013-10-13T11:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/10/13/it-never-happens-to-me/</loc><lastmod>2013-10-13T10:26:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/10/06/banking-summit-2013-milano/</loc><lastmod>2013-10-06T15:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/10/06/corso-cisa-2013/</loc><lastmod>2013-10-06T15:05:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/10/06/on-trust-and-security/</loc><lastmod>2013-10-06T14:59:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/10/06/im-back/</loc><lastmod>2013-10-06T14:31:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/04/04/honeypot-per-sistemi-icsscada/</loc><lastmod>2013-04-04T07:56:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/04/02/statistiche-sulle-vulnerabilita/</loc><lastmod>2013-04-02T14:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/03/15/more-evidence-for-the-higgs-boson/</loc><lastmod>2013-03-15T07:13:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/03/15/more-trouble-for-ssltls/</loc><lastmod>2013-03-15T07:11:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/03/10/security-summit-a-milano/</loc><lastmod>2013-03-10T11:27:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/03/09/on-web-browser-security/</loc><lastmod>2013-03-09T16:34:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/03/04/project-management-and-boeings-787-battery-blues/</loc><lastmod>2013-03-06T13:39:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/24/physics-mathematical-models-and-human-intuition/</loc><lastmod>2013-02-24T15:02:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/24/still-on-java-updates-and-security/</loc><lastmod>2013-02-24T14:32:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/19/bypassing-ios-6-x-passcode-lock/</loc><lastmod>2013-02-19T14:39:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/19/ridisegnare-i-sistemi-operativi-per-una-nuova-sicurezza/</loc><lastmod>2013-02-19T14:14:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/17/decrypting-your-frozen-mobile-phone/</loc><lastmod>2013-02-17T11:26:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/12/more-on-java-updates-and-security/</loc><lastmod>2013-02-12T09:53:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/11/android-fragmented-business-model-and-security/</loc><lastmod>2013-02-11T16:39:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/02/whats-happening-with-java/</loc><lastmod>2013-02-05T19:51:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/05/following-ieee-spectrum-risk-factor-blog/</loc><lastmod>2013-02-05T19:48:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/03/old-software-old-bug-new-exploit/</loc><lastmod>2013-02-03T14:05:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/02/02/ross-anderson-quantum-computing-and-fundamental-quantum-mechanics/</loc><lastmod>2013-02-02T14:43:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/01/26/cryptography-as-liability-shift/</loc><lastmod>2013-01-26T14:50:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/01/26/enisa-threat-landscape/</loc><lastmod>2013-01-26T14:06:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/01/24/apprendimento-e-gaming/</loc><lastmod>2013-01-24T17:49:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it/2013/01/23/computer-security-from-bottom-up-with-a-clean-slate/</loc><lastmod>2013-01-23T14:03:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ucci.it</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-02-21T17:29:52+00:00</lastmod></url></urlset>
