Andrea Fortuna
AboutRss
  • Jul 19, 2024

    Google's Potential Acquisition of Wiz: A Game-Changer in Cloud Security

    Recently Google has announced its intention to acquire Wiz, a prominent Israeli cybersecurity company, for a staggering $23 billion. This potential acquisition, if successful, would not only be Google’s largest to date but also the biggest ever in the cybersecurity… read more »
  • Jul 16, 2024

    Fostering Growth and Comfort: A Balanced Approach to People Management

    As a manager, my primary responsibility is to create an environment where my team can thrive. The views I’m about to share are purely my own, derived not from management textbooks or theories, but from my many years of hands-on… read more »
  • Jul 14, 2024

    Using Cloudflare Warp with Wireguard Clients

    Cloudflare offers a good VPN solution called Cloudflare Warp: this article delves into the intricacies of Cloudflare Warp, its foundation in Wireguard technology, and explores how users can harness its power using standard Wireguard clients, providing a flexible approach to… read more »
  • Jul 9, 2024

    Personal Threat Modeling: Safeguarding Your Digital Life

    Our digital lives are an integral part of our overall existence. From social media and online banking to cloud storage and smart home devices, we constantly interact with digital systems that process and store our personal information. While these technologies… read more »
  • Jul 8, 2024

    Hey There, Privacy Fans! Check Out These Cool Free Services I"ve Got for You

    Okay, let’s chat about something that’s been bugging me lately - and I bet it’s been on your mind too. You know how it feels like every time you turn around, some big tech company is trying to sneak a… read more »
  • Jul 3, 2024

    SIGINT, COMINT, and ELINT: Pillars of Modern Cybersecurity and Threat Intelligence

    In the shadowy world of digital espionage and cyber warfare, knowledge is power. But in an era where data flows like water through the vast networks of our interconnected world, how do we separate the signal from the noise? Enter… read more »
  • Jul 2, 2024

    The Art of Dodging Feedback: A Remote Manager's Guide to Saying Nothing While Talking a Lot

    Disclaimer: This post is entirely satirical and should not be taken seriously under any circumstances. Any resemblance to actual management advice is purely coincidental and probably a sign that you need to reevaluate your leadership style. Reader discretion (and a… read more »
  • Jun 29, 2024

    Unpredictable Chaos and Strategic Thinking: Cybersecurity Lessons from "The Three-Body Problem"

    As I closed the final pages of “Death’s End,” the concluding volume of Cixin Liu’s mind-bending “The Three-Body Problem” trilogy, I found myself awash in a sea of emotions and ideas. This epic saga, which had taken me on a… read more »
  • Jun 26, 2024

    Human Connection in the Digital World: Fostering Kindness in the Workplace

    In a dynamic and ever-evolving field like cybersecurity it’s easy to get engrossed in the technical complexities and overlook the human element. However, over the years I’ve come to realize that kindness is not just a soft skill; it’s an… read more »
  • Jun 18, 2024

    Thriving, Not Just Surviving: Why Setting Boundaries is Essential for Workplace Well-being

    The workplace can be a whirlwind of overflowing inboxes, demanding deadlines, and the expectation of constant availability. This relentless pressure can lead to burnout, resentment, and a longing for a better balance between your professional and personal life. The key… read more »
  • Jun 17, 2024

    Protecting the Protectors: Mental Health Practices for Incident Responders

    In the cybersecurity domain, incident responders act as the secret agents on the front lines of digital conflict. They engage in relentless mitigation efforts against cyber adversaries who exploit vulnerabilities that have the potential to cripple organisational infrastructure. While their… read more »
  • Jun 12, 2024

    Mobile Forensics: tools and techniques

    Performing forensic analysis on mobile devices necessitates a suite of specialized tools to ensure that data acquisition, analysis, and reporting are conducted in a forensically sound manner. In this post I’ll try to delve into the technical aspects of several… read more »
  • Jun 7, 2024

    Enhancing OSINT Investigations: Crafting Precise Questions for Effective Results

    Open Source Intelligence (OSINT) investigations serve as indispensable tools for uncovering valuable insights and mitigating potential risks. However, the efficacy of these investigations hinges upon the precision and clarity of the questions posed. Ambiguous or poorly formulated inquiries can derail… read more »
  • May 27, 2024

    Exploring My Tech Setup: From Hardware to Software and Security Practices

    Back in 2017, I shared a detailed post about the configuration of my Linux laptops on my blog (you can find it here). Since then, not only has my tech setup evolved, but my understanding and awareness of security and… read more »
  • May 25, 2024

    Chasing Numbers: Finding Joy in the Journey of Work

    Welcome, dear readers, to the frenetic world of modern work, where the rush is glorified and the only thing that matters is the end result. Ah, the culture of results! It’s as if we’re all running on a hamster wheel,… read more »
  • May 21, 2024

    Unlocking Productivity with the GTD Method

    The world of work today if full of tasks, emails, meetings, and personal projects: In this situation, you may feel overwhelmed. But the Getting Things Done (GTD), a productivity system developed by David Allen, may helps you! GTD is not… read more »
  • May 20, 2024

    How to install Ruby (and Jekyll) on Chromebook

    For several years I have been using Jekyll as a platform for my site, and for publication I use a simple GitHub Action which converts an issue into a markdown file which is then processed by Jekyll (in one of… read more »
  • May 13, 2024

    Poland investigates use and misuse of Pegasus

    In the past I have often spoken (1,2) about Pegasus, the spyware originally produced and distributed by the Israeli company NSO, which has been used by various states to spy on activists, opponents and journalists. Now, with the upcoming European… read more »
  • Apr 26, 2024

    OSINT investigations using the Wayback Machine

    The Wayback Machine is a digital archive of the internet, maintained by the Internet Archive. It allows you to view past versions of websites, which can be a valuable tool for OSINT investigations. For example, you can use the Wayback… read more »
  • Apr 3, 2024

    Is Your Pixel Safe? Google Acknowledges Exploited Vulnerabilities

    Google recently disclosed two critical vulnerabilities (CVE-2024-29745 and CVE-2024-29748) affecting Pixel smartphones that are being actively exploited by forensic companies. These zero-day flaws, which haven’t yet been patched, could potentially allow unauthorised access to user data. The news comes more… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician