Skip to content
  • Home
  • Privacy Policy
  • Contact
  • Home
  • Privacy Policy
  • Contact
Emanuele De Lucia on Cyber & AI
Emanuele De Lucia on Cyber & AI
  • Contact
  • Privacy Policy
Generic

Tecniche di Raccolta Dati delle Piattaforme di Lead Generation

Le piattaforme di Lead Generation si collocano nel contesto attuale caratterizzato da una crescente competitività nel mercato. Le aziende cercano continuamente di ottimizzare i propri processi di acquisizione clienti e...
edeluciaApr 9, 2025Apr 10, 2025
Generic

Whitelist di Sicurezza: Cosa Sono e a Cosa Servono

Nel mondo della cybersecurity, uno degli strumenti più efficaci per gestire il traffico di rete in modo proattivo è la whitelist. Sebbene spesso si parli di blacklist per bloccare siti...
edeluciaOct 25, 2024Dec 13, 2024
Generic

“Hey ESET, Wait for the Leak”: Dissecting the “OctoberSeventh” Wiper targeting ESET customers in Israel

On October 2024, attackers targeted Israeli organizations by exploiting a trusted source: ESET’s local partner, Comsecure. Apparently they compromised Comsecure’s infrastructure and used it to send phishing emails disguised as...
edeluciaOct 19, 2024Oct 23, 2024
Generic

Ransomware Report: Unveiling Trends in Attack Payouts and Negotiations

Ransomware attacks represent a significant cybersecurity threat, affecting various sectors and individuals. This study examines a comprehensive dataset of ransomware payments and chat logs to better understand the strategies and...
edeluciaOct 11, 2024Oct 11, 2024
Generic

Malware’s Shared Secrets: Code Similarity Insights for Ransomware Gangs Activities Tracking

On July 1, 2024, the cyber security vendor Halcyon, Inc., identified a novel ransomware strain they named LukaLocker (ref. here). In the article researchers from Halcyon reported a new ransomware...
edeluciaSep 9, 2024Sep 9, 2024
Generic

Unmasking the Bears’ Chrome Data Thief: The Android Cookie-Stealer Payload

On August 29, 2024, a blogpost by Google‘s Threat Analysis Group (TAG) reported the convergence of State-backed attackers and commercial surveillance vendors (CSVs) in their use of similar exploits for...
edeluciaAug 30, 2024Aug 30, 2024
Generic

The access violation that crashed the world: Technical insights of the BSOD in the CrowdStrike’s CSAgent.sys.

Important Disclaimer: Software bugs are an inherent part of software development. They have always existed and will continue to exist due to the complexity of modern systems and the inherent...
edeluciaJul 20, 2024Jul 20, 2024
Generic

Unveiling AzzaSec Ransomware: Technical insights into the group’s locker.

AzzaSec emerged as an Italian hacktivist group leveraging ransomware to further their political and ideological objectives. In recent days a lot of media attention has been dedicated to this group,...
edeluciaJul 8, 2024Jul 9, 2024
Generic

Unveiling Obfuscated Batch Scripts: From UTF-8 to UTF-16 BOM Conversion

This morning I observed an Internet Shortcut file (sha256:0817cd8b0118e2f023342ad016ef443fd4c2e4657a373f9023807a231d16b0fa – Fattura Elettronica 11817929720.url) designed to compromise an Italian organization, containing these instructions: The .lnk file in its turn showed the...
edeluciaJun 25, 2024Jun 25, 2024
Generic

A Reverse Engineer’s journey with PowerShell and XWorm

Every now and then you come across new malware variants and find something that attracts a little attention. A few days ago I acquired a VBS file, directed via a...
edeluciaJun 20, 2024Jun 20, 2024
123

  • Contact
  • Privacy Policy