• My Weekly RoundUp #128

    Big news, even this week! Cybersecurity Hackers Were Inside Citrix for Five Months Networking software giant Citrix Systems says malicious hackers were inside its networks for five months between 2018 and 2019, making off with personal and financial data on… read more »
  • Full Disk Encryption: tools and setup suggestion for personal data protection

    In order to avoid sourveillance, privacy invasion or information theft you must be sure that the data on your devices are secure, and the only way to do that in this day and age is to make sure they are… read more »
  • Social Engineering in penetration tests: my point of view and my own custom tool

    Social engineering techniques are frequently part of an overall security penetration test because also the "human network" need to be tested. But, when security tests are made on human beings, is really important pay attention to etics.Indeed, there are some… read more »
  • The "distroless" approach to Docker containers

    Most Docker images build on full Linux distributions often containing a lot of unnecessary complexity, adversely affecting also the application security. However, by using Google’s “distroless” approach we can build small and secured runtime images. Containerizing Apps, not VMs The… read more »
  • SweynTooth: Bluetooth vulnerabilities expose many BLE devices to attacks

    There's no rest for the (bluetooth) wearables A team of security researchers have discovered numerous vulnerabilities in the Bluetooth Low Energy (BLE) implementations of major vendors. Bluetooth Low Energy is a wireless communication technology (consisting of a set of standardized… read more »
  • My Weekly RoundUp #127

    Some reading to start the week! Cybersecurity Abused Cloudflare Workers Service Used to Inject Korean SEO Spam ... After further investigation, it was found that the website was actually loading SEO spam content through Cloudflare’s Workers service. This service allows… read more »
  • TLDR #2: Cross-Site Request Forgery

    Cross-Site Request Forgery (CSRF) is a type of attack that allows a malicious web site, email, blog, instant message, or program to causes a user’s web browser to perform an unwanted action on a trusted site, when the user is… read more »
  • BlueFrag (CVE-2020-0022): a critical bluetooth vulnerability in Android

    Security researchers at ERNW disclosed a vulnerability in Android bluetooth stack that lets attackers silently deliver malware to and steal data from nearby phones simply knowing the Bluetooth MAC address of the target (easy to guess just by looking at… read more »
  • CVE-2020-2100: Jenkins servers can be exploited to perform DDoS attacks

    A vulnerability (CVE-2020-2100), discovered by Adam Thorn from the University of Cambridge, may allows attacker to abuse internet-facing Jenkins servers to mount and amplify reflective DDoS attacks. Using a single, spoofed UDP packet can force vulnerable Jenkins servers [1] into… read more »
  • OWASP Amass: in-depth attack surface mapping and asset discovery

    The OWASP Amass Project is tool developed to help information security professionals during the mapping process of attack perimeter. It allows DNS enumeration, attack surface mapping & external assets discovery, using open source information gathering and active reconnaissance techniques. OWASP… read more »
  • My Weekly RoundUp #126

    This week: new layout and a lots of interesting links! Privacy WhatsApp contains ‘dangerous’ and deliberate backdoors, claims Telegram founder in a scathing blog post, Telegram Messenger’s founder, Pavel Durov, has added insult to the Facebook-owned instant messaging app’s injury by… read more »
  • SpiderFoot 3.0: OSINT reconnaissance tool

    SpiderFoot is an OSINT automation tool for reconnaissance process, written in Python 3 and GPL-licensed. Recently, Steve Micallef released on GitHub [1] a new version (3) of SpiderFoot, with a lot of interesting enhancements. Web based UI or CLI Over 170 modules (see… read more »
  • CVE-2019-18426: WhatsApp bug allowed remote access to users computers with just a text message

    Recently, developers of famous messaging app acknowledged and patched a major vulnerability that gave malicious users the ability to access files on a victim's computer. A target user may fall prey to this attack simply clicking a disguised link preview… read more »
  • Simon Weckert Google Maps Hack: a hoax?

    Is it really possible to create a fake traffic jam on Google Maps? According to ArsTechnica [1] and TheRegister [2], the german artist Simon Wecker realized a performance art piece, named "Google Maps Hacks", walking around the roads of Berlin… read more »
  • My Weekly RoundUp #125

    Some server issues, this week! So few links, sorry! Cybersecurity IM­P4GT: IM­Per­so­na­ti­on At­tacks in 4G NeT­works Long Term Evo­lu­ti­on (LTE/4G) es­ta­blis­hes mu­tu­al au­then­ti­ca­ti­on with a prov­a­b­ly se­cu­re Au­then­ti­ca­ti­on and Key Agree­ment (AKA) pro­to­col on layer three of the net­work stack.… read more »
  • Some thoughts on Information Technology in a post-apocalyptic environment

    Some funny thoughts about information technology on a post-apocalyptic environment, and some info about a more serious project! When most people think about what to do after an apocalyptic event, the first time that comes to mind is food and… read more »
  • CVE-2019-8641: remotely compromising an iPhone through iMessage

    Last December, in a talk at 36th Chaos Communication Congress, Samuel Groß presented a technical report about the infamous iOS vulnerability that allowed remote code execution on all iDevices up to iOS 12.4, within a couple of minutes and without… read more »
  • CacheOut - Another day, another CPU attack!

    A team of researchers from University of Michigan (Stephan van Schaik, Marina Minkin, Andrew Kwong and Daniel Genkin) and University of Adelaide (Yuval Yarom) recently presented a new attack technique that targets Intel CPUs. The attack, dubbed CacheOut (CVE-2020-0549), is… read more »
  • TLDR #1: Jeff Bezos’ iPhone hack

    Just few words (and links) about this hot topic. The Amazon billionaire Jeff Bezos had his mobile phone “hacked” in 2018 after receiving a WhatsApp message that had apparently been sent from the personal account of the crown prince of… read more »
  • My Weekly RoundUp #124

    Starting from this week, I'm going to start a recostructing of WeeklyRoundup (and also the whole blog): less images, more content! (...and, yes! Star Trek: Picard is awesome!) Cybersecurity Jeff Bezos hack: Amazon boss's phone 'hacked by Saudi crown prince'… read more »