-
Feb 4, 2022
For several years now I have been interested in electronic music, so I have decided to publish a series of brief articles in which I try to describe what in my view are decisive steps in the evolution of this… read more »
-
Jan 29, 2022
Cybersecurity North Korea’s Lazarus APT leverages Windows Update client, GitHub in latest campaign Lazarus Group is one of the most sophisticated North Korean APTs that has been active since 2009. The group is responsible for many high profile attacks in… read more »
-
Oct 31, 2021
Currently it is rare to see an internet user who does not have at least one account on social media sites. People use social media services to post all types of contents online such as photos, videos, text messages, but… read more »
-
Oct 23, 2021
CrowdStrike released SuperMem, a great tool for automated Windows memory analysis. SuperMem allows analysts to perform quick triage with Volatility 3, but also a full triage with Volatility 2, 3/EVTXtract/memdumping and other resource gathering tools, or a comprehensive triage with… read more »
-
Oct 3, 2021
A few days ago, my new album was released on the major platforms. In the last months I had the opportunity to watch many Anime: I think it influenced the style of the "gifts" I receive at night. In fact,… read more »
-
Sep 25, 2021
A lot of vulnerabilities, some cybercrime stuff and a serious privacy concern on Xiaomi phones. A group of researchers compiled a list of the main CVE exploited by ransomware groups Several security researchers around the world are compiling a list… read more »
-
Sep 19, 2021
Let's start again with the "Weekly roundup": what happened this week? The Pysa ransomware group is apparently starting to attack Linux systems According to recent research by cyber security firm Lacework, the cybercriminal collective known as Pysa, mainly engaged in… read more »
-
Jul 23, 2021
A recent report by The Pegasus Project, a consortium of non-profit organizations and various journalists, claimed to have discovered a leak of 50.000 phone numbers that likely belong to users who might be victims of the Pegasus spyware, developed by… read more »
-
Jul 10, 2021
Some days ago, during a brief memory analisys demonstration with Volatility, I've used a memory dump of a system infected with the "old-but-gold" Stuxnet. But, one of the spectators asked me additional info about this malware, so I decided to… read more »
-
Jun 18, 2021
The Elastic Security team recently revealed a new technique for malware obfuscation and evasion called Process Ghosting, that allows tampering of in-memory mappings of executable files on Microsoft Windows. The technique [1] is the evolution of already known attack methods… read more »
-
Jun 12, 2021
I no longer compose music for work, and this allows me to publish my musical ideas without worrying too much about the reactions of the public: do they like it? Well! Do not like? I do not care! So, recently… read more »
-
Jun 5, 2021
NTFS filesystem is a gold mine for forensic analysis on Microsoft Windows systems. There are a lot of tools useful for extract a timeline of the activities on the filesystem, or for search anomalies that identify time stomping events. Recently… read more »
-
May 29, 2021
I've always been fascinated by the works of Gérard Grisey, a french composer pioneer of the Spectralist movement. According to Wikipedia [1], spectral music is …an acoustic musical practice where compositional decisions are often informed by sonographic representations and mathematical analysis of sound spectra, or by mathematically generated… read more »
-
May 22, 2021
iLEAPP is a good iOS forensic tool developed by Alexis Brignoni. It’s composed by a set of python script previously developed by Alexis, collected in a single, useful, tool. iLEAPP [1] is developed in order to help forensic analyst during… read more »
-
May 15, 2021
On iOS devices, due the well-known os restrictions, logical acquisition is the most common type of data extraction during digital forensic investigations. There are a lot of commercial forensic tools able to perform this step, but this type of acquisition… read more »
-
May 1, 2021
I recently happened to read a research, presented during the ACM WINTECH 2020 conference, related to IMSI Catchers and their exploitation for tracking users of mobile devices. Mobile telephony standards have always used and recorded user's locations: when a user… read more »
-
Apr 24, 2021
I’m still finishing up to write down all musical ideas that came in my mind during the covid-19 lockdown, and this new collection of songs is another part of them. 11 songs, more than 1 hours of relaxing (i hope!)… read more »
-
Apr 18, 2021
During a forensic analysis, but also during other simple tasks (like helping a friend to recover deleted files), is useful to have a trusted tool to perform file-carving and data recovery. The tool that I prefer to perform this kind… read more »
-
Apr 10, 2021
Most of forensic acquisition activities on an Android device can be accomplished using the ADB (Android Debug Bridge) tool. However, a lot of commands are required: luckily, the forensic expert Mattia Epifani created a bash script that automatize a lot… read more »
-
Apr 2, 2021
An academic research, conducted by Professor Douglas J. Leith from Trinity College at the University of Dublin, analyzed traffic originating from iOS and Android devices heading to Apple and Google servers at various stages of a phone’s operation, such as… read more »