What is DREOS Cybersecurity?

DREOS cybersecurity is the DREOS AI core technology module that deals with the safety and security of any computer system.
Electronic devices, mobile devices, IoT, networks, medical equipment... our technology is able to protect any system that may be subject to cyber threats. The peculiarity of DREOS cybersecurity is PREVENTION.
DREOS cybersecurity studies the behavior of the system even when it is not attacked, continuously simulating attack scenarios that may not yet exist or may be unreal. These simulations represent hypothetical attack scenarios that we could define as "attack predictions", i.e. they serve the system to learn cyber threats that do not yet exist but that could exist in a future time, thus allowing the technology to predict attacks and protect the system at 360°, precisely preventing the attack of the system.
These predictions have proved extremely useful against new quantum attacks.

The three main categories of threats

The classification of threats depends on what are the motivations behind them.
Motivations which, in turn, determine the very modalities of the malicious action and its characteristics. For example, if the attack is motivated by political factors, there is often a strong interest on the part of the authors to hide the real reason, directing public attention elsewhere. On the other hand, a different thing happens when the reason for the cyber attack is financial and is carried out by hackers, less interested in hiding the reasons for the crime but, at the same time, determined to hide its traces.

Cyber crime

Cybercrime is the invisible threat that is changing the world. When we talk about cybercrime, we generally refer to it to a criminal activity characterized by the abuse of computer technology components, both hardware and software. It aims to attack computer systems for financial gain or to cause disruption in business processes. A "cybercriminal" is defined as a subject who, driven by criminal motivations, carries out cyber attacks in order to extort money or steal information vital to the organization.

Cyber attack

When cybercrime becomes more and more politically motivated, we can talk about real cyberattacks. this type of Cyberattacks have lower development costs than normal war tactics and can involve greater risks for governments or political institutions with repercussions also for the citizen. While their impact on sovereign ratings will likely remain limited, government entities are increasingly at risk every day, requiring extremely high cybersecurity policy.

Cyber terrorism

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.
Cyberterrorism is a controversial term. Some opt for a very narrow definition, relating to deployment by known terrorist organizations with the primary purpose of creating alarm, panic, or physical disruption. Other prefer a broader definition, which includes cybercrime.

The different types of Cybersecurity

When we talk about cybersecurity we mean a series of actions designed to defend electronic systems, networks, servers, devices (and their data) from cyber attacks. Basically, it's a series of actions and measures designed for IT and information security. The protection of sensitive data and computer systems can take place in different ways. We list some types of security strategies that can be created with DREOS cybersecurity:

Network security

concerning the defense of networks from hacker attacks

Information security

that protects data and preserves its integrity and privacy

Application security

which aims to protect software and devices from possible cyber threats

Operational safety

that protects data assets, including the permissions used by users to access a network and data storage and sharing practices

Hardware security

protects computer systems from complex attacks that are difficult to understand as they affect the hardware component of the system, certain processes connected to them or specific software processes (BIOS, HDD, SSD, hard disk vibrations, webcams, etc).

Training people

which are the end users and which is the most important strategy of Cybersecurity. Preventing dangerous behavior, teaching users how to behave safely online, what to do and what activities are best avoided, is essential for the security of any system

Attack that DREOS can be predict

DREOS cybersecurity is able to predict and prevent any computer system, network or device from being attacked by a threat using a map of complex deep learning algorithms. But how many types of threats can attack a system? We list some of them below:


is software specifically designed to gain unauthorized access to and/or damage a device. There are numerous types of malware: viruses, trojans, botnets, spyware, adware

Social Engineering

has the goal of obtaining sensitive user information and that usually requires a payment or access to confidential data


is the most common cyber attack. It consists of sending fraudulent emails that look like emails from known and reliable sources in order to steal sensitive data from users, such as credit card numbers.

and much else!

Ransomware, DoS attack, Man-in-the-middle, Password attack, SQL injection, Cross-site scripting (XSS), Eavesdropping, Quantum attack (cyber attacks performed by quantum computers) and many others.

Which DREOS AI algorithms or cognitive processes are used by DREOS cybersecurity?

As specified on this page, DREOS cybersecurity is a DREOS AI technology module: this means that it uses all the algorithms, neural network maps, cognitive processes (which you can see in detail by clicking here), training and learning methods (which you can see in detail by clicking here) of the main technology but with a specific focus on cybersecurity.
This happens by assigning a higher priority to certain cognitive processes (or algorithms) than others, as they are fundamental for the correct execution of its tasks.
These listed are the 3 cognitive processes with maximum priority used by DREOS cybersecurity.
The training has as its goal the protection of the system observed.


The emotional process is necessary for the DREOS cybersecurity module to learn the extreme danger of a cyber attack.
DREOS cybersecurity understands that a threat would not only damage the system but also harm human. This "idea" leads our system to learn the negative human emotions (sadness, pain, anger) following an attack: it begins to hypothesize attack scenarios or contexts (real and otherwise) that could cause this type of emotions. At the same time it begins to create threats (real and not) which it will insert in the hypothesized scenarios and contexts by simulating within its memory any type of computer attack and any type of damage that the system or the human would suffer. The creation of potentially infinite and potentially surreal scenarios and attacks, combined with the action of prediction and creativity processes, allows DREOS cybersecurity to prevent any type of attack, threat, action or behavior that could damage the system or the human.

Read more

The prediction process is a FUNDAMENTAL process used by the entire DREOS AI technology.
The algorithms of this process allow our technology to both make predictions and run simulations within the predictions created.
In the cybersecurity field, the first step is the study of the information necessary for prediction: existing threats, already existing technologies, experimental technologies, IT vulnerabilities and human vulnerabilities.
Once this information has been learned, the system begins to predict its evolution in a given period of time (for example evolution of quantum technologies, chips, human weaknesses associated with the continuous evolution of technology, etcetera).
These predictions will be nothing more than life scenarios that can be real or science fiction but are equally taken into consideration by DREOS cybersecurity.
In these scenarios, the threats and attacks created by our technology will then be simulated.

Read more

The creativity process is a FUNDAMENTAL process used by the entire DREOS AI technology.
The algorithms of this process allow our technology to have ideas, intuitions. To think just like a human mind.
In the field of cybersecurity, this process allows our system to create any type of data that could damage a system using both information it already knows about and completely new information that is the result of its own ideas or intuitions (a malicious code inside an image, some scripts that can be started using a certain RGB channel).
Used with the prediction process, it allows to create and simulate the effects of the new data created in a given scenario.

Read more