I believe books can change a live. I do also believe that Artificial Intelligence might change the way we are working, improving, studying and interacting with each other. So why do not fit them together in an unique place ? Introducing Amazing Books Podcast, the first fully AI generated podcast on amazing books. I do […]
Read more "Amazing Books: The Podcast"
Introduction Phishing kits are tools that dark side experts provide to the community of criminal phishers to facilitate the construction of malicious Web sites. As these kitsevolve in sophistication, providers of Web-based services need to keep pace withcontinuous complexity. Today I am proud to introduce a long time research that Andrea Venturi, Michele Colajanni, Giorgio […]
Read more "Phishing Kits: Threat Actors Analysis Research"
Introduction System calls are the ultimate high-level atomic actions that Malware writers might control. System calls sequences are the defacto ultimate way to divide behaviors between good and bad. For example the system call “encrypt” could be used by a privacy oriented software to encrypt content before shipping-it to a cloud storage or it could […]
Read more "Windows System Calls For Hunters"
Introduction When I’ve firstly seen the technique behind the Shellcode execution through Microsoft Windows Callbacks, I thought it was pure magic. But then, digging a little bit on it, I figured out that it was just brilliant ! Nowadays this technique is quite used in underground communities to inject shellcode into running processes so I […]
Read more "Running Shellcode Through Windows Callbacks"
Disclaimer This blog post, as all the blog posts in my web-corner, want to share cybersecurity related researches and personal experiences in order to improve threats analysis, risks and cybersecurity awareness. In this specific cases junior cybersecurity analysts could improve their skills for free by understanding how to build threat intelligence and how to track […]
Read more "From a Phishing Page to a Possible Threat Actor"
Kubernets and server-less applications would be the biggest next things to protect. So it would be a great idea to start to get practice on such environment, especially if you had no previous opportunities. Here my post on how to build your first kubernets cluster based on Raspberry Pi4 ! Raspberry is a cheap and […]
Read more "Building your Kubernets Cluster For Cybersecurity Prototyping"