Sandro Sana - August 26th, 2025
In early 2025, an Italian organization found itself the victim of a sneaky intrusion. No dramatic exploit, no textbook attack. What opened the door to the attackers was a VPN...
Sandro Sana - August 3rd, 2025
Rootkits are one of the most insidious and complex cyber threats in the digital security landscape. The term "rootkit" comes from the combination of two words: "root," which in Unix...
Sandro Sana - July 29th, 2025
Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data for use as evidence in a legal context. This field...
Sandro Sana - March 5th, 2025
The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25...
Sandro Sana - July 2nd, 2024
A recent critical vulnerability in OpenSSH, identified as CVE-2024-6387, could allow unauthenticated remote code execution with root privileges on glibc-based Linux systems. This flaw resides in the server component of...