Andrea Fortuna
AboutRss
  • Jul 6, 2023

    RedEnergy: a sophisticated Stealer-as-a-Ransomware threat

    A new and highly sophisticated threat called RedEnergy has emerged, targeting energy utilities, oil, gas, telecom, and machinery sectors in Brazil and the Philippines. This threat combines the functionalities of a stealer and ransomware, posing a significant risk to its… read more »
  • Jun 27, 2023

    Mockingjay: a new Process Injection technique evading EDR detection

    A new process injection technique called Mockingjay has been discovered by researchers at cybersecurity firm Security Joes. The technique allows threat actors to execute malicious code on compromised systems without being detected by Endpoint Detection and Response (EDR) and other… read more »
  • Jun 25, 2023

    How to install Arch Linux on a Chromebook in a container, using Crostini

    Crostini is the technology used by Google to make Linux application support easy to use and integrate well with Chrome OS. The goal of this guide use the Chrome OS Terminal with Arch Linux distros alongside the default penguin (stripped-down)… read more »
  • Jun 22, 2023

    Operation Triangulation: Apple releases patches for zero-day exploits in spyware campaign

    Apple has released security patches to address two zero-day vulnerabilities (CVE-2023-32434 and CVE-2023-32439) exploited in the spyware campaign known as Operation Triangulation. The spyware TriangleDB, active since 2019 and discovered by cybersecurity firm Kaspersky, targets its victims by sending malicious… read more »
  • Jun 17, 2023

    Uncovering Tor Hidden Service with Etag

    According to a recent research, The Onion Router network, which provides anonymity and resistance to identification and tracking, has a new vulnerability that could compromise the anonymity of its users. Already in 2014, Tor issued a security advisory after discovering… read more »
  • Jun 16, 2023

    'Fragile Things' is out!

    ‘There are so many fragile things, after all. People break so easily, and so do dreams and hearts.’ Inspired by the literary work of Neil Gaiman, this collection of five tracks aims to take you on a relaxing journey exploring… read more »
  • Jun 15, 2023

    UNC4841: the Pro-China threat actor behind exploitation of Barracuda ESG Zero-Day Vulnerability

    A suspected pro-China threat group, UNC4841, has been identified as the perpetrator of data-theft attacks on Barracuda Email Security Gateway (ESG) appliances. The group exploited a now-patched zero-day vulnerability, CVE-2023-2868, to gain unauthorized access and steal sensitive data. Mandiant, a… read more »
  • Jun 13, 2023

    What if ChatGPT had free access to the Internet?

    Greg Brockman, one of the co-founders of OpenAI, created a demo for a TED Talk in which ChatGPT is given the ability to access the Internet and external services. The ChatBot, with access to external reality, consults documents, provides links… read more »
  • Jun 10, 2023

    The rise of Asylum Ambuscade: from phishing campaigns to global cybercrime wave

    The threat actor known as Asylum Ambuscade has been observed straddling cybercrime and cyber espionage operations since at least early 2020. In a recent analysis by ESET, it was revealed that Asylum Ambuscade is a crimeware group targeting bank customers… read more »
  • Jun 7, 2023

    Rhysida Ransomware group: tactics and targets

    A new ransomware group named Rhysida has emerged in the cyber threat landscape, targeting various organizations between 23 May 2023 and 4 June 2023. This group has already made its presence known by naming and targeting multiple victims, which include… read more »
  • Jun 2, 2023

    Operation Triangulation: targets iOS devices with zero-click exploits

    A previously unknown and highly sophisticated Advanced Persistent Threat (APT) has recently come to light, targeting iOS devices in a long-running mobile campaign called Operation Triangulation. According to cybersecurity firm Kaspersky, the attackers employ zero-click exploits via the iMessage platform… read more »
  • Jun 1, 2023

    Terminator: a new BYOVD attack tool

    A recent discovery in the cybersecurity landscape has unveiled a concerning tool known as ‘Terminator’, promoted by a threat actor named Spyboy on a Russian-speaking forum, that claims to have the capability to terminate any antivirus, XDR, and EDR platform.… read more »
  • May 27, 2023

    Predator: a commercial Android spyware

    Security researchers from Cisco Talos have recently shared an in-depth analysis of the commercial Android spyware known as Predator, developed by Intellexa (previously Cytrox), an Israeli company. This spyware gained attention when Google’s Threat Analysis Group (TAG) discovered its involvement… read more »
  • May 23, 2023

    BlackCat exploits Windows Kernel Drivers to avoid detection

    In a recent report, Trend Micro researchers uncovered a significant incident involving ALPHV/BlackCat ransomware, occured on February 2023. The attackers behind this operation employed a cunning tactic by utilizing signed malicious Windows kernel drivers, which allowed them to evade detection.… read more »
  • May 22, 2023

    From Giraffes to Dogs: unveiling the unpredictability of Computer Image Recognition

    Most image recognition systems use what is known as Probabilistic Image Recognition, a technique used by computer systems to identify objects or patterns in images based on statistical probabilities. Rather than providing a definitive answer, the system assigns a probability… read more »
  • May 19, 2023

    Microsoft identify connection between FIN7 and Clop Ransomware

    The FIN7 cybercrime group has added the Clop ransomware to its arsenal after a period of inactivity. They are known for previously using ransomware variants like REvil and Maze. According to a series of tweets from the Microsoft Security Intelligence… read more »
  • May 18, 2023

    Lemon Group exploiting pre-infected Android phones for malicious activities

    A cybercrime group called Lemon Group is using millions of pre-infected Android smartphones globally to carry out malicious activities, such as stealing and selling SMS messages, social media and online messaging accounts, as well as generating revenue through advertisements and… read more »
  • May 13, 2023

    New Stealthy Variant of Linux Malware BPFDoor Discovered

    A new version of the Linux malware BPFDoor has been discovered, which is more stealthy and has stronger encryption and reverse shell communications. BPFDoor is a backdoor malware that was first discovered by security researchers about a year ago but… read more »
  • May 11, 2023

    Threat actors exploit Babuk code leak to develop ransomware variants targeting VMware ESXi

    The leak of the Babuk ransomware code in September 2021 has led to the development of multiple ransomware families capable of targeting VMware ESXi systems. Several cybercrime groups have used the leaked source code to create new variants, indicating a… read more »
  • May 9, 2023

    A simple TO-DO manager in .bashrc

    I am a big fan of to-do lists: having a to-do list always at hand relaxes me :-). But I’m also a big fan of command line interfaces: so on all my Linux boxes I started using a simple modification… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician