• My Weekly RoundUp #111

    Nobel prize, Breaking Bad and (oh no, again!) Simjacker! Cybersecurity These are the 29 countries vulnerable to Simjacker attacks Adaptive Mobile -- the cyber-security company that discovered the Simjacker attack -- published today a list of countries where local mobile operators ship… read more »
  • Playing with the cat (in the command line)

    The name of cat utility is derived from its function to concatenate files, so nothing about kittens, i'm sorry! Cover image courtesy of Ivo The Cat cat is a tool which reads data from one locations and writes it to… read more »
  • Two NTLM vulnerabilities may allow full AD domain compromise

    On October 2019 Patch Tuesday, Microsoft released patches for CVE-2019-1166 and CVE-2019-1338, two serious vulnerabilities that may leading to a full Active Directory domain compromise. Two researchers from Preempt,  Yaron Zinar and Marina Simakov, discovered two security vulnerabilities in Microsoft's NTLM authentication… read more »
  • Venator: information gathering on OSX systems

    Some weeks ago I've already written about information gathering on OSX systems, related to the forensic investigation process. In my previous post, I've suggested OSXCollector as tool for a "light" forensic aquisition. Today I'd like to share another suggestion, another… read more »
  • How to upgrade BIOS on a Lenovo laptop running linux

    Usually, Lenovo releases BIOS updates in two formats: a single .EXE file, that needs to be executed on a Windows OS, and a .ISO file that needs to be burned on a CD. But, how can i perform the upgrade… read more »
  • My Weekly RoundUp #110

    Entertainment, Privacy and Technology…and a couple of goodies about machine learning! https://twitter.com/leftoblique/status/1179476277549400064 Technology Elon Musk confirms customizable horns and movement sounds (including coconuts) coming to Teslas https://twitter.com/elonmusk/status/1180877114226008064 Tesla was preparing to introduce movement sounds to Tesla cars which would alert pedestrians… read more »
  • Watch out! A new vulnerability in WhatsApp for Android allows attackers to perform remote commands on devices

    Security researcher Awakened has identified a vulnerability in the Android version of WhatsApp messaging app which could allow attackers to launch remote code execution attacks (with privilege elevation) on victims. Exploiting the flaw, however, is a rather complicated affair: involves… read more »
  • Some thoughts about Windows 10 "Timeline" forensics artifacts

    Today i'll talk you briefly about the Windows 10 "Timeline": a feature that can come in handy during a forensic analysis. How to access it and how to analyze it? Since the April 2018 Update, Windows 10 includes a feature… read more »