Andrea Fortuna
AboutRss
  • Mar 29, 2023

    TOR Browser installers used to spread cryptocurrency theft malware

    Since September 2022, trojanised installers for the TOR browser have been used to distribute Clipper malware, which steals cryptocurrency from users in Russia and Eastern Europe. The malware scans clipboard contents for cryptocurrency wallet addresses and replaces them with addresses… read more »
  • Mar 29, 2023

    APT43: a new North Korean espionage group

    A new report from cybersecurity firm Mandiant sheds light on a previously unknown threat actor operating on behalf of the North Korean regime and using cybercrime to fund its espionage operations. The group, dubbed APT43, is a prolific and aggressive… read more »
  • Mar 27, 2023

    MacStealer malware targets Apple's macOS devices to steal sensitive information

    According to a recent research from cybersecurity firm Uptycs, a new malware named MacStealer is targeting Apple’s macOS operating system to steal sensitive information, including documents, cookies, and login credentials. The malware primarily affects devices running macOS versions Catalina and… read more »
  • Mar 26, 2023

    Nim programming language used to create Dark Power ransomware

    A new ransomware operation called Dark Power has surfaced, targeting organisations around the world and demanding relatively small ransom payments of $10,000. According to a recent report from cybersecurity firm Trellix, the ransomware uses the Nim programming language, making it… read more »
  • Mar 24, 2023

    Untitled Goose Tool: CISA's query and analysis tool for Azure and M365

    The US Cybersecurity & Infrastructure Security Agency (CISA) has released a new open-source incident response tool that helps detect signs of malicious activity in Microsoft cloud environments. Known as the “Untitled Goose Tool”, this Python-based utility can download telemetry information… read more »
  • Mar 22, 2023

    Android phones vulnerable to remote hacking via phone numbers

    Google has released a warning that certain Android phones may be remotely hacked without the need for the victim to interact with anything. The attack can allow a remote user access to call information and text messages being transmitted via… read more »
  • Mar 21, 2023

    Chaos Engineering: breaking systems to make them stronger

    Chaos Engineering is a practice that aims to identify potential issues and vulnerabilities in a system by deliberately introducing controlled failures. The goal is to expose weaknesses before they cause significant damage in a real-world scenario. Advances in large-scale, distributed… read more »
  • Mar 20, 2023

    Vulnerability allows restoration of sensitive information on Google Pixel screenshots

    Security researchers David Buchanan and Simon Aarons have discovered a serious vulnerability in Google Markup, the screenshot editing tool available on Pixel devices. The bug, dubbed “aCropalypse”, allows certain parts of the image to be restored, potentially exposing sensitive information.… read more »
  • Mar 15, 2023

    Dero cryptocurrency mining campaign discovered by CrowdStrike

    CrowdStrike has discovered a cryptojacking campaign targeting Kubernetes infrastructure, believed to be the first Dero cryptojacking operation. Dero is a private, decentralised application platform that offers enhanced privacy and anonymity compared to other cryptocurrencies. The attack targets Kubernetes clusters exposed… read more »
  • Mar 15, 2023

    March 2023 Patch Tuesday: Two actively exploited zero days disclosed

    Microsoft has released 80 security patches for its March 2023 Patch Tuesday rollout. The patches include 9 Critical, 70 Important, and 1 Moderate vulnerabilities. Additionally, there are two actively exploited zero-day vulnerabilities: a Critical elevation of privilege within Microsoft Outlook… read more »
  • Mar 14, 2023

    GoBruteforcer: new malware targets web servers

    Researchers at Palo Alto Networks Unit 42 have discovered a new malware called GoBruteforcer, written in Golang and targeting web servers running phpMyAdmin, MySQL, FTP and Postgres. The malware scans Classless Inter-Domain Routing (CIDR) blocks and brute-force passwords using a… read more »
  • Mar 13, 2023

    Essential Tools for Gathering and Analyzing IOCs

    In Cyber Threat Intelligence, the collection and analysis of Indicators of Compromise (IOCs) is critical because they provide valuable information that can help organisations detect and respond to cyber threats more effectively. IOCs are pieces of evidence or artefacts that… read more »
  • Mar 11, 2023

    Plaso 20230226 has been released

    Plaso is a Python-based engine that can automatically create timelines from various files found on typical computer systems. It can extract timestamps from file system metadata, log files, registry files, browser history, email archives, and many other sources, and can… read more »
  • Mar 10, 2023

    UNC4540 targets unpatched SonicWall gateways with credential-stealing malware

    According to a recent report from cybersecurity firm Mandiant, Chinese cybercriminals are targeting unpatched SonicWall gateways with credential-stealing malware that persists through firmware upgrades. The spyware is targeting the SonicWall Secure Mobile Access 100 Series, which provides VPN access to… read more »
  • Mar 9, 2023

    CERT, CSIRT or SOC?

    When it comes to responding to cybersecurity incidents, organisations have several options, including using a Computer Emergency Response Team (CERT), a Computer Security Incident Response Team (CSIRT) or a Security Operations Center (SOC). While these teams may seem interchangeable, there… read more »
  • Mar 9, 2023

    Bitwarden vulnerability allows attackers to steal passwords using iframes

    The popular open-source password management service, Bitwarden, offers an auto-fill feature that can automatically fill in users’ saved credentials when they visit a website. However, this feature has a potentially dangerous behavior that could allow malicious iframes embedded in trusted… read more »
  • Mar 8, 2023

    Sharp Panda is starting to use a new version of the Soul framework

    Chinese threat actor Sharp Panda has targeted high-profile government agencies in Southeast Asia with a cyber espionage campaign using a new version of the Soul modular framework. Cybersecurity firm Check Point has described the activity as “long-running” and has previously… read more »
  • Mar 6, 2023

    MITIGA expose Google Cloud Platform's lack of forensic storage visibility

    A new report from cybersecurity firm MITIGA has revealed that malicious actors can exploit a lack of forensic visibility in Google Cloud Platform (GCP) to exfiltrate sensitive data. The research found that GCP does not provide sufficient visibility into its… read more »
  • Mar 5, 2023

    CrowdStrike released the 2023 Global Threat Report

    CrowdStrike has released its 9th Annual Global Threat Report, which provides a comprehensive overview of threat actor behaviour, tactics and trends over the past year. The report is based on the activities of more than 200 cyber adversaries and covers… read more »
  • Mar 3, 2023

    CISA released DECIDER, an open source tool that helps generate MITRE ATT&CK mappings.

    The Cybersecurity and Infrastructure Security Agency (CISA) recently launched a free tool called Decider to help the cybersecurity community map threat actor behaviour to the MITRE ATT&CK Framework. Decider uses a combination of guided questions, efficient search and filtering, and… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician