Leading the uncertainty: the decision-driven approach
Many of my readers know me as a cybersecurity expert. More than 12 years of blogging on “security stuff”, malware analyses, cyber attack attributions, new tools and a personal (public here)...
View ArticleMalware Persistence Locations: Windows and Linux
Malware persistence is a crucial aspect of cyber threats that often goes unnoticed by unsuspecting users. In the realm of cybersecurity, it refers to the ability of malicious software to establish a...
View ArticleUnderstanding and Defending Against Microsoft 365 Attacks
As the use of Microsoft 365 continues to grow, cyber attackers are increasingly targeting its cloud-based infrastructure. In this extensive post, we will delve into the realm of new Microsoft 365...
View ArticleAmazing Books Podcast
Hi folks,today I’m proud to share another episode of the “Amazing Books Podcast” where my AI Conductors talk about one of my favorite and just discovered (thanks to Federico) books: Inspired by Marty...
View ArticleThe Rising of Protestware During Times of War
In the ever-evolving landscape of cybersecurity threats, a disconcerting phenomenon has emerged, challenging the conventional notions of malicious software. Enter “protestware” — a term that sends...
View ArticleTechnical Data Sheet: NoName057(16)
NoName057(16) is a notorious hacktivist group with a primary focus on targeting 8-10 victims daily. Operating on a global scale, this group engages in cyber activities to promote its ideological...
View ArticleTechnical Data Sheet: LOCKBIT 3.0
LOCKBIT 3.0 is a notorious Ransomware Group that was first identified on 09 Dec, 2022. Operating with various aliases and suspected to be involved in a range of cyber activities, this group poses a...
View ArticleX Gold Badges: a new proliferating market
When I saw a threat actor hijacking the X account of Google’s Mandiant division and promoting a cryptocurrency scam I suddenly became curious about this new prominent trend. Indeed this attack was...
View Articlei-SOON Data Leak: Key Points
Introduction i-SOON (上海安洵), a prominent contractor for various Chinese government agencies such as the Ministry of Public Security, Ministry of State Security, and People’s Liberation Army,...
View ArticleXZ Utils Backdoor (CVE-2024-3094): Personal Notes
In a surprising discovery that’s set the tech world abuzz, a hidden backdoor was found in XZ Utils, a widely-used library that facilitates lossless data compression. Given its popularity across...
View Article2023 Breaches and Incidents: Personal Notes
Introduction In today's digital landscape, the prevalence of cyber threats and incidents has become a significant concern for individuals, organizations, and governments alike. I have had the...
View ArticleLeading the uncertainty: the decision-driven approach
Many of my readers know me as a cybersecurity expert. More than 12 years of blogging on "security stuff", malware analyses, cyber attack attributions, new tools and a personal (public here)...
View ArticleMalware Persistence Locations: Windows and Linux
Malware persistence is a crucial aspect of cyber threats that often goes unnoticed by unsuspecting users. In the realm of cybersecurity, it refers to the ability of malicious software to establish a...
View ArticleUnderstanding and Defending Against Microsoft 365 Attacks
As the use of Microsoft 365 continues to grow, cyber attackers are increasingly targeting its cloud-based infrastructure. In this extensive post, we will delve into the realm of new Microsoft 365...
View ArticleAmazing Books Podcast
Hi folks,today I'm proud to share another episode of the "Amazing Books Podcast" where my AI Conductors talk about one of my favorite and just discovered (thanks to Federico) books: Inspired by Marty...
View ArticleThe Rising of Protestware During Times of War
In the ever-evolving landscape of cybersecurity threats, a disconcerting phenomenon has emerged, challenging the conventional notions of malicious software. Enter "protestware" — a term that sends...
View ArticleTechnical Data Sheet: NoName057(16)
NoName057(16) is a notorious hacktivist group with a primary focus on targeting 8-10 victims daily. Operating on a global scale, this group engages in cyber activities to promote its ideological...
View ArticleTechnical Data Sheet: LOCKBIT 3.0
LOCKBIT 3.0 is a notorious Ransomware Group that was first identified on 09 Dec, 2022. Operating with various aliases and suspected to be involved in a range of cyber activities, this group poses a...
View ArticleX Gold Badges: a new proliferating market
When I saw a threat actor hijacking the X account of Google's Mandiant division and promoting a cryptocurrency scam I suddenly became curious about this new prominent trend. Indeed this attack was...
View Articlei-SOON Data Leak: Key Points
Introduction i-SOON (上海安洵), a prominent contractor for various Chinese government agencies such as the Ministry of Public Security, Ministry of State Security, and People’s Liberation Army,...
View Article