Andrea Fortuna
AboutRss
  • Nov 24, 2024

    The Count of Monte Cristo: from revenge to history's first cyber attack

    In Alexandre Dumas’ masterpiece “The Count of Monte Cristo,” we find not only a tale of revenge and redemption but also what might be considered one of literature’s first depictions of a sophisticated information system attack. Before we analyze this… read more »
  • Nov 17, 2024

    Burnt Out? It's not you, it's the economy

    Sarah stares at her computer screen, her third coffee of the morning growing cold beside her keyboard. It’s 7 AM, and she’s already responding to urgent emails from her manager. Like millions of others, she’s caught in the hamster wheel… read more »
  • Nov 16, 2024

    Gentle strings: a Ukulele's journey from past to present

    Have you ever had that surreal moment when you stumble upon a piece of your past self and realize that maybe, just maybe, you were a bit too harsh on yourself back then? Well, that’s exactly what happened to me… read more »
  • Nov 11, 2024

    The Automation Trap: why we can't fully automate our way to better security

    Disclaimer: This article reflects my personal opinions and experiences as a security professional. It should not be taken as definitive advice, but rather as a starting point for discussion and further exploration of this important topic. A new trend is… read more »
  • Nov 7, 2024

    Collaborate and Protect: lessons from ‘The Cathedral and the Bazaar’ for modern cybersecurity

    Eric Steven Raymond’s classic essay, The Cathedral and the Bazaar, remains a powerful piece of open-source philosophy that still shapes modern software development. The essay reflects on the contrasting approaches to software creation—the “Cathedral” and the “Bazaar”—and draws on Raymond’s… read more »
  • Oct 28, 2024

    Musical easter eggs: my tribute to CandyRat artists

    In the vast landscape of independent record labels, CandyRat Records stands as a beacon for acoustic guitar enthusiasts worldwide. This American label has earned its reputation as a curator of exceptional acoustic guitar talent, consistently discovering and nurturing artists who… read more »
  • Oct 12, 2024

    Lost and Found sounds: a weekend adventure in musical time travel

    If you’ve been following my blog for a while, you know I usually dive deep into the latest cybersecurity and technology trends. But today, we’re taking a bit of a detour. For those who know me personally, it’s no secret… read more »
  • Sep 28, 2024

    Work-life balance is a myth! Strive for work-life harmony!

    In recent years, the quest for work-life balance has often been seen as the Holy Grail of professional success and personal fulfilment. But what if I told you that work-life balance is a myth? The idea of perfectly dividing time… read more »
  • Sep 22, 2024

    The great SOC charade

    Disclaimer: The following story is entirely fictional. Before we embark on this rollercoaster ride of hypothetical incompetence, let me assure you that any resemblance to actual persons, living or dead, or actual events is purely coincidental. Really. I mean it.… read more »
  • Sep 18, 2024

    Favicon Forensics: hunting phishing sites with Shodan

    As phishing attacks become more sophisticated, investigators and security professionals need innovative techniques to identify and combat these threats. In this article, we look at an often overlooked method: using favicon hashes in conjunction with Shodan to uncover potential phishing… read more »
  • Sep 14, 2024

    When automation hits the fan: a tale of CTI misadventure

    Disclaimer The following story is a work of fiction. Any resemblance to actual persons, living or dead, or actual events is purely coincidental. …Or is it? In the midst of the COVID-19 pandemic, when remote work had become the norm,… read more »
  • Sep 10, 2024

    macOS Sequoia and DFIR: what investigators need to know

    With Apple’s upcoming release of macOS Sequoia on September 16th, the field of Digital Forensics and Incident Response faces new challenges and opportunities. Introduction to macOS Sequoia macOS Sequoia, the latest iteration of Apple’s desktop operating system, brings a host… read more »
  • Sep 8, 2024

    Elevating every team member: the 'No One Left Behind' approach

    As teams grow more diverse and projects become increasingly complex, managers face the challenge of ensuring that every team member contributes, develops, and feels valued. My mantra in these situations is “No one should be left behind”. Understanding the “No… read more »
  • Sep 5, 2024

    The hidden risks of Cherry-Picking in Incident Response and Digital Forensics

    Incident response and digital forensics play crucial roles in understanding, mitigating, and preventing security events. However, a common pitfall that can undermine even the most sophisticated investigative efforts is the practice of “cherry picking” – selectively choosing evidence that supports… read more »
  • Sep 1, 2024

    Forensic acquisition of ChromeOS devices

    In recent years, ChromeOS has gained significant traction as a lightweight, cloud-focused operating system, particularly in educational and enterprise environments. The simplicity and security of ChromeOS make it an appealing choice for many users, but these same features pose unique… read more »
  • Aug 28, 2024

    The curious case of the iPhone 11 Pro and the hacked contest

    Working in cybersecurity for a large corporation often means your colleagues look to you as their personal tech guru, answering questions ranging from “Which password manager should I use?” to “Can hackers steal my money if I answer a call… read more »
  • Aug 26, 2024

    The rise of Telegram as a hub for cybercrime: a closer look at its misuse and the implications of Pavel Durov"s arrest

    Telegram, once a symbol of free speech and privacy, has increasingly found itself at the center of controversy. With its robust encryption and user-friendly interface, it has become a haven for various illicit activities. This article delves into how Telegram… read more »
  • Aug 24, 2024

    From Faceless to FaceTime: installing webcam drivers on a Debian-powered MacBook Air

    In today’s fast-paced tech world, it’s easy to get caught up in the latest and greatest devices. But what if I told you that sometimes, the old can be made new again? That’s exactly what I discovered when I decided… read more »
  • Aug 23, 2024

    The Olivetti approach to team management: a Human-Centric paradigm

    In the field of corporate management, few names resonate with the same visionary reverence as Adriano Olivetti. Known for his forward-thinking approach to industrial management, Olivetti’s philosophy transcended mere profit maximization, focusing instead on the well-being of his employees, the… read more »
  • Aug 22, 2024

    The great server room shuffle: a tale of fiber optics and folly

    Disclaimer: A Totally Fictional Account What you’re about to read is, of course, a completely made-up story. Any resemblance to actual IT disasters is purely coincidental. After all, no real IT professional would ever prop open a fire door with… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician