• New Dark Pink APT group targets governmental and military organizations

    A new advanced threat actor known as Dark Pink, also referred to as Saaiwc Group, has been found to be targeting government agencies and military bodies in multiple countries in the APAC region using custom malware to steal confidential information.… read more »
  • Kubernetes clusters targeted by Kinsing malware campaign

    The Kinsing malware is targeting Kubernetes clusters by exploiting known vulnerabilities in container images and misconfigured PostgreSQL containers. The malware has a history of targeting containerized environments for crypto mining, and the threat actors behind it have been known to… read more »
  • A brief history of malware

    These days I am finishing the first draft of a new book of the “Little Handbooks” series, dedicated to Malware Analysis. One of the first chapters is a brief history of computer viruses. Comments and feedback are welcome! Malware is… read more »
  • Agile Methodology in Cybersecurity: Benefits, Challenges, and Best Practices

    Introduction Agile methodologies have become increasingly popular in recent years as a way to accelerate the development of software and other projects. Unlike traditional Waterfall methodologies, which follow a linear and sequential process, agile approaches emphasize flexibility, collaboration, and rapid… read more »
  • The Swiss cheese cybersecurity model

    The Swiss cheese model is a risk management concept that can be applied to cybersecurity to help organizations understand and mitigate the risks they face. The model suggests that there are multiple layers of defense, or “slices of cheese,” in… read more »
  • Vulnerability in Google Home smart speaker allowed to snoop users conversations

    Security researcher Matt Kunze discovered a bug in Google’s smart speaker, the Google Home, which allowed for the creation of a backdoor account that could be used to remotely control the device and access the microphone feed. This could potentially… read more »
  • MasquerAds: a new Malvertising campaign via Google Ads

    A new cyber attack campaign called MasquerAds is targeting users who are searching for popular software by using Google Ads to serve malware-infected variants of the software. These malware-infected versions, which include Raccoon Stealer and Vidar, are being served through… read more »
  • BlueNoroff APT group using new ways to bypass MotW protection

    The BlueNoroff subcluster of the Lazarus Group has adopted new techniques that allow it to bypass Windows’ Mark of the Web protections. MotW The Windows Mark of the Web (MotW) is a security feature that helps protect users from malicious… read more »
  • Lastpass databreach: what is the actual risk?

    LastPass, a password management software used by over 33 million people and 100,000 businesses worldwide, has revealed that customer vault data was stolen after the company’s cloud storage was breached earlier this year. What happened? The attacker gained access to… read more »
  • Open source tools for SOC: my own list

    A SOC, or Security Operations Center, is a centralized unit within an organization responsible for the detection, analysis, and response to cyber threats and vulnerabilities. It is typically responsible for managing and monitoring the security of an organization’s networks, systems,… read more »
  • The Little Handbook of Online Privacy

    This book had a very long gestation. I started writing it at the end of 2019 and then, because of more important commitments, I decided to put it on hold and pick it up a few months later. In early… read more »
  • Cyber Incident Response Plan: the Post Incident Review

    Cybersecurity is a critical issue in the modern world. As more and more of our personal and professional lives move online, the need for effective cybersecurity measures becomes increasingly important. One key aspect of maintaining strong cybersecurity posture is the… read more »
  • Will blogs be written by AIs in the future?

    I tried to ask ChatGPT (an OpenAI project based on GPT 3.5) to explain if and why in the future all blogs will be written by artificial intelligences…here is the answer! In recent years, there has been a growing trend… read more »
  • “Shine” is available on Spotify

    In the past months I have decided to move away for a while from the joyful and relaxing atmospheres that have characterized my musical production in recent years, and develop somewhat more crepuscular themes. “Shine” is a 4-track EP, designed… read more »
  • Telegram vs. WhatsApp: Pavel Durov's viewpoint

    Over the past few years, Telegram founder Pavel Durov has waged a sort of “battle” against WhatsApp, highlighting its security and privacy problems. Durov has always been very attentive to issues of privacy and freedom of speech more generally, having… read more »
  • Stable Diffusion on Google Colab

    Text-to-image algorithms creates an image from scratch from a text description, using machine learning to understand your words and convert them to a unique image each time. Researchers at OpenAI, Google, Facebook, and others have developed text-to-image tools, and similar… read more »
  • My Weekly Roundup #161

    Cybersecurity Samsung Has Been Hacked: What Data Has Been Stolen? On September 2, Samsung published a security advisory confirming it had been hacked. The breach would appear to have been of Samsung systems in the U.S. and took place in… read more »
  • Search tools for forensic investigation

    During a forensic investigation, a big part of all tasks are composed by searches on files. Below is a brief list of the tools I usually use for this type of activity.. awk An extremely useful tool, especially for parsing… read more »
  • Windows 10 administrator password recovery

    Time ago I have had to perform memory capture on a Windows 10 system that was infected with malware but whose administrator password had been lost. “Fortunately,”, the malware had gained a fair amount of persistence and was able to… read more »
  • My Weekly Roundup #160

    Cybersecurity A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information DGA is one of the classic techniques for botnets to hide their C2s, attacker only needs to selectively register a very small number of C2 domains, while for… read more »