post SWEED Targeting Precision Engineering Companies in ItalyAttack Cyber Crime cybersecurityOctober 28, 2019October 28, 2019
post Frequent VBA Macros used in Office MalwareAttack cybersecurity CyberTools experienceOctober 1, 2019October 1, 2019
post Attacking Machine Learning Detectors: the state of the art reviewAttack Cyber Crime reverse engineering Security UncategorizedJune 26, 2018January 9, 2019
post CERTs, CSIRTs and SOCs after 10 years from definitionsAttack Cyber Crime Security UncategorizedMarch 25, 2018January 9, 2019
post Control Flow Integrity: a Javascript Evasion TechniqueAttack Cyber Crime reverse engineering Security UncategorizedFebruary 21, 2018January 9, 2019