-
Dec 1, 2022
In the past months I have decided to move away for a while from the joyful and relaxing atmospheres that have characterized my musical production in recent years, and develop somewhat more crepuscular themes. “Shine” is a 4-track EP, designed… read more »
-
Oct 19, 2022
Over the past few years, Telegram founder Pavel Durov has waged a sort of “battle” against WhatsApp, highlighting its security and privacy problems. Durov has always been very attentive to issues of privacy and freedom of speech more generally, having… read more »
-
Sep 25, 2022
Text-to-image algorithms creates an image from scratch from a text description, using machine learning to understand your words and convert them to a unique image each time. Researchers at OpenAI, Google, Facebook, and others have developed text-to-image tools, and similar… read more »
-
Sep 4, 2022
Cybersecurity Samsung Has Been Hacked: What Data Has Been Stolen? On September 2, Samsung published a security advisory confirming it had been hacked. The breach would appear to have been of Samsung systems in the U.S. and took place in… read more »
-
Aug 21, 2022
During a forensic investigation, a big part of all tasks are composed by searches on files. Below is a brief list of the tools I usually use for this type of activity.. awk An extremely useful tool, especially for parsing… read more »
-
Aug 12, 2022
Time ago I have had to perform memory capture on a Windows 10 system that was infected with malware but whose administrator password had been lost. “Fortunately,”, the malware had gained a fair amount of persistence and was able to… read more »
-
Aug 7, 2022
Cybersecurity A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information DGA is one of the classic techniques for botnets to hide their C2s, attacker only needs to selectively register a very small number of C2 domains, while for… read more »
-
Jul 31, 2022
Cybersecurity Microsoft ties novel ‘Raspberry Robin’ malware to Evil Corp cybercrime syndicate Microsoft’s security team published evidence this week tying the Raspberry Robin malware to Russian cybercrime syndicate Evil Corp. New Qualys Research Report: Evolution of Quasar RAT The Qualys… read more »
-
Jul 24, 2022
Cybersecurity Reverse Image Search Guide #osint The tool I recommend you start your search with is Yandex Images. Not only does it search very well for similar images, but it also recognizes the text on them and identifies the location… read more »
-
Jul 17, 2022
A selection of interesting news published during this week on news.andreafortuna.org. Cybersecurity Above the Fold and in Your Inbox: Tracing State-Aligned Activity Targeting Journalists, Media Key Takeaways Those involved in media make for appealing targets given the unique access, information,… read more »
-
Jul 10, 2022
Cybersecurity Killnet: Russian DDoS Group Claims Attack on US Congress Website On July 8, the Russian hacktivist DDoS group “Killnet” claimed responsibility for an attack on the website of US Congress. A Library of Congress spokesperson told CyberScoop that the… read more »
-
Jul 3, 2022
Cybersecurity Rogue HackerOne employee steals bug reports to sell on the side A HackerOne employee stole vulnerability reports submitted through the bug bounty platform and disclosed them to affected customers to claim financial rewards. Facebook 2FA phish arrives just 28… read more »
-
Jul 2, 2022
“New Horizons”: five tracks, lo-fi and deep relaxing music.
Album cover
“New Horizons”, my new album, is out on Spotify and all major music streaming platforms.
… read more »
-
Jun 26, 2022
Cybersecurity Google says attackers worked with ISPs to deploy Hermit spyware on Android and iOS A sophisticated spyware campaign is getting the help of internet service providers (ISPs) to trick users into downloading malicious apps, according to research published by… read more »
-
Jun 19, 2022
Cybersecurity China-linked APT Flew Under Radar for Decade Evidence suggests that a just-discovered APT has been active since 2013. DeadBolt ransomware takes another shot at QNAP storage QNAP is warning users about another wave of DeadBolt ransomware attacks against its… read more »
-
Jun 18, 2022
Four Quartets for synth ensemble, four rarefied, meditative and relaxing pieces.
Recommended good headphones.
Album cover
“Four Quartets”, my new album, is out on Spotify and all major music streaming platforms.
… read more »
-
Jun 12, 2022
Cybersecurity Multi-factor Authentication In-The-Wild bypass methods Two-factor authentication (2FA) or multi-factor authentication ( MFA ) is a method to authenticate through a service that requires at least two proofs of recognition. PACMAN M1 chip attack defeats ‘the last line of… read more »
-
Jun 11, 2022
Some days ago, a follower asked me for more information about an article announcing the possibility of hacking iPhones even when switched off. Actually, the situation is not that serious, but let’s take a step back. “slide to power off”… read more »
-
Jun 5, 2022
Cybersecurity Microsoft disrupts Bohrium hackers’ spear-phishing operation The Microsoft Digital Crimes Unit (DCU) has disrupted a spear-phishing operation linked to an Iranian threat actor tracked as Bohrium that targeted customers in the U.S., Middle East, and India. SMSFactory Android Trojan… read more »
-
May 29, 2022
Cybersecurity Operation Delilah: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise Actor Today, INTERPOL and The Nigeria Police Force announced the arrest of a prominent business email compromise (BEC) actor who has been active since 2015. How This Shocking… read more »