-
Jan 1, 2020
20 years ago the entire world was afraid to descend into chaos as a result of computers not being able to cope with displaying a date containing year 2000: both computer experts and general public alike were convinced that computers… read more »
-
Dec 24, 2019
"The Hitchhiker's Guide to the Galaxy" is a cultural icon in science-fiction that spawned five books, stage shows, a 1981 TV series, a computer game, comic books and a major motion picture. But originally it was just a radio comedy… read more »
-
Dec 23, 2019
By default, containers run in unprivileged mode, that is, we cannot run Docker daemon inside a Docker container. However, a privileged Docker container is allowed to access to all the devices on the host woth the same privileges of the… read more »
-
Dec 20, 2019
POCKINT stands for "Pocket Intelligence".It is an OSINT multi purposes GUI program designed to be a lightweight and portable. POCKINT provides users with essential OSINT capabilities: input box accepts typical indicators (URL, IP, MD5) and gives users the ability to… read more »
-
Dec 19, 2019
According to a TrendMicro's report, 'The New Norm', the major cybersecurity risks for organizations in 2020 comes from DevOps, third-party libraries, container components and even remote workers. A pleasant reading for the Christmas holidays! The report [1] warns of a… read more »
-
Dec 18, 2019
Security research group Check Point Research recently uncovered a flaw in WhatsApp through which a single malicious user could crash the apps of all members of a group chat. After joining a group chat, a malicious user could edit specific… read more »
-
Dec 17, 2019
Some days ago, I've been looking at a website named "IBM 360 Model 20 Rescue and Restoration": a group of brave engineer started the project of restoration of an IBM System 360 Model 20, documenting all steps of the process.… read more »
-
Dec 16, 2019
Few news this week: a couple of link about ransomware (Ryuk and Snatch), an interesting attack on Intel CPUs, a Windows 0day and a phishing attack on Office365.Then, a security incident on S3 buckets and an interesting article about DNS… read more »