-
Apr 9, 2022
For several years now I have been interested in electronic music, so I have decided to publish a series of brief articles in which I try to describe what in my view are decisive steps in the evolution of this… read more »
-
Apr 3, 2022
Cybersecurity Apple releases fixes for two zero-days affecting Macs, iPhones and iPads Apple published two notices on Thursday about two zero-day vulnerabilities affecting Macs, iPhones and iPads. Apple released fixes for CVE-2022-22675 and CVE-2022-22674, both of which were submitted by… read more »
-
Apr 2, 2022
Some time ago, I’ve published a list of open source forensics tools. In this update, I’ve included also closed source and commercial products. Frameworks and Toolkits The Sleuth Kit The Sleuth Kit (TSK) is a library and collection of command… read more »
-
Mar 26, 2022
Cybersecurity Okta on handling of Lapsus$ breach: ‘We made a mistake’ We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - August 3. Join AI and data leaders for insightful talks and exciting networking… read more »
-
Mar 26, 2022
Recently, some of my followers asked me some updates on my list of OSINT tools, published some years ago. So, I collected a new list of tools, in order to enrich my previous post. E-mail and Credentials Email Lookup Retrieve… read more »
-
Mar 20, 2022
Cybersecurity Browser In The Browser (BITB) Attack This article explores a phishing technique that simulates a browser window within the browser to spoof a legitimate domain. For security professionals, the URL is usually the most trusted aspect of a domain.… read more »
-
Mar 13, 2022
Cybersecurity Rewriting Romance Victim History: Common Truths and Falsehoods Told by Society Over the years I have worked with many people who track romance scams. I’ve spoken to analysts, psychologists, police officers, federal law enforcement, and most painfully: the victims.… read more »
-
Mar 5, 2022
Cybersecurity Fake News of Cyber Attacks Fast-Spreads, as Conflict between Russia and Ukraine Escalates One of the most active players in the cyberspace during the war in Ukraine are hacktivists that support either Russia or Ukraine for ideological reasons. Those… read more »
-
Feb 27, 2022
Cybersecurity Threat Advisory: Cyclops Blink Cisco Talos is aware of the recent reporting around a new modular malware family, Cyclops Blink, that targets small and home office (SOHO) devices, similar to previously observed threats like VPNFilter. Ukraine calls for volunteer… read more »
-
Feb 19, 2022
Cybersecurity Free Cybersecurity Services and Tools As part of our continuing mission to reduce cybersecurity risk across U.S. critical infrastructure partners and state, local, tribal, and territorial governments, CISA has compiled a list of free cybersecurity tools and services to… read more »
-
Feb 13, 2022
Cybersecurity Full Hancitor malware analysis Hancitor is a famous malware loader that has been in use for years since first being observed in 2015. A malware loader drops the actual malicious content on the system then executes the first stage… read more »
-
Feb 11, 2022
For several years now I have been interested in electronic music, so I have decided to publish a series of brief articles in which I try to describe what in my view are decisive steps in the evolution of this… read more »
-
Feb 6, 2022
Cybersecurity Cyberattack on News Corp, Believed Linked to China, Targeted Emails of Journalists, Others The attack, discovered on Jan. 20, affected units including The Wall Street Journal, the New York Post and the U.K. Operation EmailThief: Active Exploitation of Zero-day… read more »
-
Feb 4, 2022
For several years now I have been interested in electronic music, so I have decided to publish a series of brief articles in which I try to describe what in my view are decisive steps in the evolution of this… read more »
-
Jan 29, 2022
Cybersecurity North Korea’s Lazarus APT leverages Windows Update client, GitHub in latest campaign Lazarus Group is one of the most sophisticated North Korean APTs that has been active since 2009. The group is responsible for many high profile attacks in… read more »
-
Oct 31, 2021
Currently it is rare to see an internet user who does not have at least one account on social media sites. People use social media services to post all types of contents online such as photos, videos, text messages, but… read more »
-
Oct 23, 2021
CrowdStrike released SuperMem, a great tool for automated Windows memory analysis. SuperMem allows analysts to perform quick triage with Volatility 3, but also a full triage with Volatility 2, 3/EVTXtract/memdumping and other resource gathering tools, or a comprehensive triage with… read more »
-
Oct 3, 2021
A few days ago, my new album was released on the major platforms. In the last months I had the opportunity to watch many Anime: I think it influenced the style of the "gifts" I receive at night. In fact,… read more »
-
Sep 25, 2021
A lot of vulnerabilities, some cybercrime stuff and a serious privacy concern on Xiaomi phones. A group of researchers compiled a list of the main CVE exploited by ransomware groups Several security researchers around the world are compiling a list… read more »
-
Sep 19, 2021
Let's start again with the "Weekly roundup": what happened this week? The Pysa ransomware group is apparently starting to attack Linux systems According to recent research by cyber security firm Lacework, the cybercriminal collective known as Pysa, mainly engaged in… read more »