Quantcast
Channel: cybersecurity - Marco Ramilli
Browsing all 20 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Leading the uncertainty: the decision-driven approach

Many of my readers know me as a cybersecurity expert. More than 12 years of blogging on “security stuff”, malware analyses, cyber attack attributions, new tools and a personal (public here)...

View Article


Malware Persistence Locations: Windows and Linux

Malware persistence is a crucial aspect of cyber threats that often goes unnoticed by unsuspecting users. In the realm of cybersecurity, it refers to the ability of malicious software to establish a...

View Article


Image may be NSFW.
Clik here to view.

Understanding and Defending Against Microsoft 365 Attacks

As the use of Microsoft 365 continues to grow, cyber attackers are increasingly targeting its cloud-based infrastructure. In this extensive post, we will delve into the realm of new Microsoft 365...

View Article

Image may be NSFW.
Clik here to view.

Amazing Books Podcast

Hi folks,today I’m proud to share another episode of the “Amazing Books Podcast” where my AI Conductors talk about one of my favorite and just discovered (thanks to Federico) books: Inspired by Marty...

View Article

Image may be NSFW.
Clik here to view.

The Rising of Protestware During Times of War

In the ever-evolving landscape of cybersecurity threats, a disconcerting phenomenon has emerged, challenging the conventional notions of malicious software. Enter “protestware” — a term that sends...

View Article


Technical Data Sheet: NoName057(16)

NoName057(16) is a notorious hacktivist group with a primary focus on targeting 8-10 victims daily. Operating on a global scale, this group engages in cyber activities to promote its ideological...

View Article

Technical Data Sheet: LOCKBIT 3.0

LOCKBIT 3.0 is a notorious Ransomware Group that was first identified on 09 Dec, 2022. Operating with various aliases and suspected to be involved in a range of cyber activities, this group poses a...

View Article

Image may be NSFW.
Clik here to view.

X Gold Badges: a new proliferating market

When I saw a threat actor hijacking the X account of Google’s Mandiant division and promoting a cryptocurrency scam I suddenly became curious about this new prominent trend. Indeed this attack was...

View Article


Image may be NSFW.
Clik here to view.

i-SOON Data Leak: Key Points

Introduction i-SOON (上海安洵), a prominent contractor for various Chinese government agencies such as the Ministry of Public Security, Ministry of State Security, and People’s Liberation Army,...

View Article


Image may be NSFW.
Clik here to view.

XZ Utils Backdoor (CVE-2024-3094): Personal Notes

In a surprising discovery that’s set the tech world abuzz, a hidden backdoor was found in XZ Utils, a widely-used library that facilitates lossless data compression. Given its popularity across...

View Article

Image may be NSFW.
Clik here to view.

2023 Breaches and Incidents: Personal Notes

Introduction In today's digital landscape, the prevalence of cyber threats and incidents has become a significant concern for individuals, organizations, and governments alike. I have had the...

View Article

Image may be NSFW.
Clik here to view.

Leading the uncertainty: the decision-driven approach

Many of my readers know me as a cybersecurity expert. More than 12 years of blogging on "security stuff", malware analyses, cyber attack attributions, new tools and a personal (public here)...

View Article

Malware Persistence Locations: Windows and Linux

Malware persistence is a crucial aspect of cyber threats that often goes unnoticed by unsuspecting users. In the realm of cybersecurity, it refers to the ability of malicious software to establish a...

View Article


Image may be NSFW.
Clik here to view.

Understanding and Defending Against Microsoft 365 Attacks

As the use of Microsoft 365 continues to grow, cyber attackers are increasingly targeting its cloud-based infrastructure. In this extensive post, we will delve into the realm of new Microsoft 365...

View Article

Image may be NSFW.
Clik here to view.

Amazing Books Podcast

Hi folks,today I'm proud to share another episode of the "Amazing Books Podcast" where my AI Conductors talk about one of my favorite and just discovered (thanks to Federico) books: Inspired by Marty...

View Article


Image may be NSFW.
Clik here to view.

The Rising of Protestware During Times of War

In the ever-evolving landscape of cybersecurity threats, a disconcerting phenomenon has emerged, challenging the conventional notions of malicious software. Enter "protestware" — a term that sends...

View Article

Technical Data Sheet: NoName057(16)

NoName057(16) is a notorious hacktivist group with a primary focus on targeting 8-10 victims daily. Operating on a global scale, this group engages in cyber activities to promote its ideological...

View Article


Technical Data Sheet: LOCKBIT 3.0

LOCKBIT 3.0 is a notorious Ransomware Group that was first identified on 09 Dec, 2022. Operating with various aliases and suspected to be involved in a range of cyber activities, this group poses a...

View Article

Image may be NSFW.
Clik here to view.

X Gold Badges: a new proliferating market

When I saw a threat actor hijacking the X account of Google's Mandiant division and promoting a cryptocurrency scam I suddenly became curious about this new prominent trend. Indeed this attack was...

View Article

Image may be NSFW.
Clik here to view.

i-SOON Data Leak: Key Points

Introduction i-SOON (上海安洵), a prominent contractor for various Chinese government agencies such as the Ministry of Public Security, Ministry of State Security, and People’s Liberation Army,...

View Article
Browsing all 20 articles
Browse latest View live