-
Apr 24, 2025
Over the years, I’ve come to recognize and work on a series of leadership habits that, despite appearing beneficial at first glance, can significantly disrupt team dynamics and hinder overall performance. These habits often stem from a genuine desire to… read more »
-
Apr 20, 2025
“Why bring your own tools when the house is already full of them?” This is precisely the principle behind one of the most cunning techniques employed by cybercriminals: the use of LOLBins. What are LOLBins? LOLBins, an acronym for “Living… read more »
-
Apr 18, 2025
On this blog, i usually dive deep into the worlds of technology and cybersecurity , discussing the latest threats, exploring new architectures, and debating the best security postures. These are fields demanding precision, vigilance, and often, high stakes. The pressure… read more »
-
Apr 15, 2025
Recently, a new method of attack has emerged that specifically targets the growing intersection between artificial intelligence and software development. This technique, known as “slopsquatting,” represents a clever exploitation of AI-assisted programming that could potentially bypass traditional security measures and… read more »
-
Apr 11, 2025
With just a click, platforms like ChatGPT can transform your everyday selfie into a pastel character straight out of a Studio Ghibli film. The process is charming, the results endearing, and the entire experience takes mere seconds. But in our… read more »
-
Apr 7, 2025
Over the years, I’ve published numerous tutorials and resource lists dedicated to OSINT (Open Source Intelligence). Many of you have found these resources valuable for your research and investigations. Today, I wanted to compile a fresh, comprehensive, and updated article… read more »
-
Mar 28, 2025
I’ve previously discussed similar toxic workplace dynamics in my article on mobbing and straining, where we explored the silent, insidious threats that can destroy employee morale and wellbeing (read it here). Today, I want to focus on another particularly reprehensible… read more »
-
Mar 23, 2025
Today I’d like to explore how OSINT can help companies, especially small and medium-sized enterprises (SMEs), comply with the European NIS2 directive—a regulation designed to boost cybersecurity standards across the continent. We will also delve into insights from Mirko Lapi’s… read more »