• My Weekly Roundup #140

    Cybersecurity Rewriting Romance Victim History: Common Truths and Falsehoods Told by Society Over the years I have worked with many people who track romance scams. I’ve spoken to analysts, psychologists, police officers, federal law enforcement, and most painfully: the victims.… read more »
  • My Weekly Roundup #139

    Cybersecurity Fake News of Cyber Attacks Fast-Spreads, as Conflict between Russia and Ukraine Escalates One of the most active players in the cyberspace during the war in Ukraine are hacktivists that support either Russia or Ukraine for ideological reasons. Those… read more »
  • My Weekly Roundup #138

    Cybersecurity Threat Advisory: Cyclops Blink Cisco Talos is aware of the recent reporting around a new modular malware family, Cyclops Blink, that targets small and home office (SOHO) devices, similar to previously observed threats like VPNFilter. Ukraine calls for volunteer… read more »
  • My Weekly Roundup #137

    Cybersecurity Free Cybersecurity Services and Tools As part of our continuing mission to reduce cybersecurity risk across U.S. critical infrastructure partners and state, local, tribal, and territorial governments, CISA has compiled a list of free cybersecurity tools and services to… read more »
  • My Weekly Roundup #136

    Cybersecurity Full Hancitor malware analysis Hancitor is a famous malware loader that has been in use for years since first being observed in 2015. A malware loader drops the actual malicious content on the system then executes the first stage… read more »
  • The History of Electronic Music, part 2: the Theremin

    For several years now I have been interested in electronic music, so I have decided to publish a series of brief articles in which I try to describe what in my view are decisive steps in the evolution of this… read more »
  • My Weekly Roundup #135

    Cybersecurity Cyberattack on News Corp, Believed Linked to China, Targeted Emails of Journalists, Others The attack, discovered on Jan. 20, affected units including The Wall Street Journal, the New York Post and the U.K. Operation EmailThief: Active Exploitation of Zero-day… read more »
  • The History of Electronic Music, part 1: the Telharmonium

    For several years now I have been interested in electronic music, so I have decided to publish a series of brief articles in which I try to describe what in my view are decisive steps in the evolution of this… read more »
  • My Weekly Roundup #134

    Cybersecurity North Korea’s Lazarus APT leverages Windows Update client, GitHub in latest campaign Lazarus Group is one of the most sophisticated North Korean APTs that has been active since 2009. The group is responsible for many high profile attacks in… read more »
  • Five useful tools for Social Media Intelligence

    Currently it is rare to see an internet user who does not have at least one account on social media sites. People use social media services to post all types of contents online such as photos, videos, text messages, but… read more »
  • If you're a fan of Volatility, you'll love CrowdStrike’s SuperMem

    CrowdStrike released SuperMem, a great tool for automated Windows memory analysis. SuperMem allows analysts to perform quick triage with Volatility 3, but also a full triage with Volatility 2, 3/EVTXtract/memdumping and other resource gathering tools, or a comprehensive triage with… read more »
  • “Handle With Care”: a bit classic, a bit J-Pop

    A few days ago, my new album was released on the major platforms. In the last months I had the opportunity to watch many Anime: I think it influenced the style of the "gifts" I receive at night. In fact,… read more »
  • Cybersecurity Roundup #20

    A lot of vulnerabilities, some cybercrime stuff and a serious privacy concern on Xiaomi phones. A group of researchers compiled a list of the main CVE exploited by ransomware groups Several security researchers around the world are compiling a list… read more »
  • Cybersecurity Roundup #19

    Let's start again with the "Weekly roundup": what happened this week? The Pysa ransomware group is apparently starting to attack Linux systems According to recent research by cyber security firm Lacework, the cybercriminal collective known as Pysa, mainly engaged in… read more »
  • How to check Pegasus Spyware on your iPhone

    A recent report by The Pegasus Project, a consortium of non-profit organizations and various journalists, claimed to have discovered a leak of 50.000 phone numbers that likely belong to users who might be victims of the Pegasus spyware, developed by… read more »
  • Some thoughts about Stuxnet

    Some days ago, during a brief memory analisys demonstration with Volatility, I've used a memory dump of a system infected with the "old-but-gold" Stuxnet. But, one of the spectators asked me additional info about this malware, so I decided to… read more »
  • How “Process Ghosting“ works

    The Elastic Security team recently revealed a new technique for malware obfuscation and evasion called Process Ghosting, that allows tampering of in-memory mappings of executable files on Microsoft Windows. The technique [1] is the evolution of already known attack methods… read more »
  • "The Journey": get comfortable, it will take some time

    I no longer compose music for work, and this allows me to publish my musical ideas without worrying too much about the reactions of the public: do they like it? Well! Do not like? I do not care! So, recently… read more »
  • dfir_ntfs: a forensic parser for NTFS filesystems

    NTFS filesystem is a gold mine for forensic analysis on Microsoft Windows systems. There are a lot of tools useful for extract a timeline of the activities on the filesystem, or for search anomalies that identify time stomping events. Recently… read more »
  • “Soundscapes”, my spectral music experimentation

    I've always been fascinated by the works of Gérard Grisey, a french composer pioneer of the Spectralist movement. According to Wikipedia [1], spectral music is …an acoustic musical practice where compositional decisions are often informed by sonographic representations and mathematical analysis of sound spectra, or by mathematically generated… read more »