• My Weekly Roundup #149

    Cybersecurity ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups IBM Security X-Force researchers have continually analyzed the use of several crypters developed by the cybercriminal group ITG23, also known as Wizard Spider, DEV-0193, or simply the “Trickbot Group”. InfoSec Handlers Diary… read more »
  • My Weekly Roundup #148

    Cybersecurity Harmful Help: Analyzing a Malicious Compiled HTML Help File Delivering Agent Tesla This blog describes an attack that Unit 42 observed utilizing malicious compiled HTML help files for the initial delivery. We will show how to analyze the malicious… read more »
  • My Weekly Roundup #147

    Cybersecurity Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding Cobalt Strike is commercial threat emulation software that emulates a quiet, long-term embedded actor in a network. This actor, known as Beacon, communicates with an external team server to… read more »
  • Fleeting Moment of Truth

    Gather all worries related to pandemics, wars and personal problems, process them, obtain what could be a glimmer of hope for a better tomorrow and put it on the stave. Album cover “Fleeting Moment of Truth”, my new album, is… read more »
  • My Weekly Roundup #146

    Cybersecurity EmoCheck Tool 2.2 Supports and Detects New 64-bit Variants of Emotet Malware JPCERT/CC, Japan’s first CSIRT (Computer Security Incident Response Team), has released a new version of their open-source tool EmoCheck to identify new 64-bit variants of the Emotet… read more »
  • My Weekly Roundup #145

    Cybersecurity LemonDuck botnet plunders Docker cloud instances in cryptocurrency crime wave Operators of the LemonDuck botnet are targeting Docker instances in a cryptocurrency mining campaign. LemonDuck is cryptocurrency mining malware wrapped up in a botnet structure. Threat Assessment: BlackByte Ransomware… read more »
  • My Weekly Roundup #144

    Cybersecurity A DDoS attack took down Finnish govt sites as Ukraine’s President addresses MPs A massive DDoS attack took down Finnish government websites while Ukrainian President Zelenskyy addressed Finland’s members of parliament (MPs). On April 8, a denial-of-service attack took… read more »
  • The History of Electronic Music, part 3: Noises

    For several years now I have been interested in electronic music, so I have decided to publish a series of brief articles in which I try to describe what in my view are decisive steps in the evolution of this… read more »
  • My Weekly Roundup #143

    Cybersecurity Apple releases fixes for two zero-days affecting Macs, iPhones and iPads Apple published two notices on Thursday about two zero-day vulnerabilities affecting Macs, iPhones and iPads. Apple released fixes for CVE-2022-22675 and CVE-2022-22674, both of which were submitted by… read more »
  • Digital Forensics Tools: my own list

    Some time ago, I’ve published a list of open source forensics tools. In this update, I’ve included also closed source and commercial products. Frameworks and Toolkits The Sleuth Kit The Sleuth Kit (TSK) is a library and collection of command… read more »
  • My Weekly Roundup #142

    Cybersecurity Okta on handling of Lapsus$ breach: ‘We made a mistake’ We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - August 3. Join AI and data leaders for insightful talks and exciting networking… read more »
  • OSINT tools: my own list, updated

    Recently, some of my followers asked me some updates on my list of OSINT tools, published some years ago. So, I collected a new list of tools, in order to enrich my previous post. E-mail and Credentials Email Lookup Retrieve… read more »
  • My Weekly Roundup #141

    Cybersecurity Browser In The Browser (BITB) Attack This article explores a phishing technique that simulates a browser window within the browser to spoof a legitimate domain. For security professionals, the URL is usually the most trusted aspect of a domain.… read more »
  • My Weekly Roundup #140

    Cybersecurity Rewriting Romance Victim History: Common Truths and Falsehoods Told by Society Over the years I have worked with many people who track romance scams. I’ve spoken to analysts, psychologists, police officers, federal law enforcement, and most painfully: the victims.… read more »
  • My Weekly Roundup #139

    Cybersecurity Fake News of Cyber Attacks Fast-Spreads, as Conflict between Russia and Ukraine Escalates One of the most active players in the cyberspace during the war in Ukraine are hacktivists that support either Russia or Ukraine for ideological reasons. Those… read more »
  • My Weekly Roundup #138

    Cybersecurity Threat Advisory: Cyclops Blink Cisco Talos is aware of the recent reporting around a new modular malware family, Cyclops Blink, that targets small and home office (SOHO) devices, similar to previously observed threats like VPNFilter. Ukraine calls for volunteer… read more »
  • My Weekly Roundup #137

    Cybersecurity Free Cybersecurity Services and Tools As part of our continuing mission to reduce cybersecurity risk across U.S. critical infrastructure partners and state, local, tribal, and territorial governments, CISA has compiled a list of free cybersecurity tools and services to… read more »
  • My Weekly Roundup #136

    Cybersecurity Full Hancitor malware analysis Hancitor is a famous malware loader that has been in use for years since first being observed in 2015. A malware loader drops the actual malicious content on the system then executes the first stage… read more »
  • The History of Electronic Music, part 2: the Theremin

    For several years now I have been interested in electronic music, so I have decided to publish a series of brief articles in which I try to describe what in my view are decisive steps in the evolution of this… read more »
  • My Weekly Roundup #135

    Cybersecurity Cyberattack on News Corp, Believed Linked to China, Targeted Emails of Journalists, Others The attack, discovered on Jan. 20, affected units including The Wall Street Journal, the New York Post and the U.K. Operation EmailThief: Active Exploitation of Zero-day… read more »