-
Oct 18, 2025
North Korean state-sponsored hackers have significantly enhanced their malware arsenal by merging capabilities from two previously distinct malware families, creating a more sophisticated threat to organizations worldwide. This evolution represents a critical shift in the operational tactics of one of… read more »
-
Oct 17, 2025
Cybersecurity researchers have uncovered a sophisticated attack campaign targeting Cisco network devices through a critical SNMP vulnerability. The operation demonstrates how threat actors are exploiting enterprise infrastructure vulnerabilities to establish persistent access and deploy advanced rootkits on Linux-based systems. The… read more »
-
Oct 17, 2025
Traditional data loss prevention systems have reached their breaking point. After years of relying on rigid policies and keyword matching, organizations continue to experience devastating data breaches despite investing millions in DLP solutions. The industry now stands at a critical… read more »
-
Oct 8, 2025
The recent investigation by Italian journalists at Fanpage.it has exposed a critical vulnerability that allowed them to clone government email addresses, including that of Prime Minister Giorgia Meloni. This alarming discovery serves as a stark reminder that even the most… read more »
-
Oct 5, 2025
After the release of macOS 26, I noticed a flood of user reports about anomalous CPU and RAM usage by the WindowServer process. It turned out that the issue wasn’t a bug in macOS itself, but rather in the Electron… read more »
-
Oct 1, 2025
TL;DR Confirmation bias quietly distorts OSINT and incident response work. Build multiple hypotheses and feed them equally. Assign a rotating devil’s advocate and take dissent seriously. Document why you reject evidence, not just why you accept it. Tools help with… read more »
-
Sep 9, 2025
Artificial Intelligence is everywhere. From smart assistants that finish our sentences, to chatbots that try to solve our problems (sometimes before we even know what the problem is), it all feels a bit magical. But there’s a tiny catch: sometimes… read more »
-
Sep 6, 2025
TL;DR In digital forensics and incident response, uncovering hidden artefacts often makes the difference between a stalled investigation and a break-through. One such powerful yet under-appreciated artefact is the USN Journal (Update Sequence Number Journal), an NTFS feature that quietly… read more »
-
Sep 4, 2025
Based on Anthropic’s August 2025 Threat Intelligence Report Cybersecurity is experiencing a seismic shift. Advanced Persistent Threat (APT) groups, those sophisticated nation-state and criminal actors we’ve grown accustomed to tracking through traditional methods, are now wielding artificial intelligence as their… read more »
-
Aug 22, 2025
Running a Security Operations Center is less about stacking tools and more about orchestrating your people. The effectiveness of a SOC heavily depends on how strategically its human resources are allocated. While technology and automation play crucial roles, building the… read more »
-
Aug 9, 2025
Light, practical and human: because practising your incident plan should feel like rehearsal, not punishment. What is a tabletop exercise (TTX)? A tabletop exercise is a facilitated, discussion-based rehearsal where people talk through a realistic incident scenario: no systems are… read more »
-
Aug 8, 2025
I remember the first time I heard about threat modeling. Someone described it to me as “sitting in a room, imagining all the ways your system could be destroyed.” That sounded… intense. I pictured a group of security folks in… read more »
-
Aug 5, 2025
A teenager armed with nothing but curiosity and a Discord account successfully infiltrates a multinational corporation worth billions. Meanwhile, that same corporation’s cybersecurity team consists entirely of professionals holding impressive certificates and decades of theoretical training. This isn’t a hypothetical… read more »
-
Jul 31, 2025
Those who know me are aware I like to mess around with all sorts of instruments: real ones, virtual ones, strings, brass, drums… if it makes noise and works in MIDI, I’ll give it a shot. But somehow, I always… read more »
-
Jul 30, 2025
In the beginner’s mind there are many possibilities, but in the expert’s there are few — Shunryu Suzuki A few days ago, I had the pleasure of attending a cozy gathering where Gianrico Carofiglio, celebrated Italian author and former magistrate,… read more »
-
Jul 27, 2025
Picture this: you’re part of a team trying to get stuff done. Maybe it’s deploy a feature, solving a thorny bug, or just making it to Friday without a full-blown existential crisis. And then (kaboom!) here come the meetings, the… read more »
-
Jul 20, 2025
So, Kubernetes 2.0 is on the horizon, and apparently they’re finally saying goodbye to YAML. Let me just take a moment to savor this delicious irony. After years of telling us that YAML was the elegant solution to container orchestration,… read more »
-
Jun 29, 2025
Among my many passions, one stands out for being as humbling as it is addictive: chess. Despite being a fairly mediocre player (my win/loss ratio is… let’s say balanced by optimism), I absolutely love spending my free time playing online… read more »
-
Jun 20, 2025
Today I decided to run a little experiment. I asked an AI to write a brutally honest, no-holds-barred critique of Kubernetes, something really spicy that would make the container orchestration crowd squirm in their ergonomic office chairs. “Make it controversial,”… read more »
-
Jun 15, 2025
A few days ago, a friend dropped what she probably thought was a simple compliment: “I’ve been listening to your music on Spotify: I really love your guitar pieces. But why don’t you ever play them live?” Her face when… read more »