The threat actor APT28 , classified as an Advanced Persistent Threat, active since at least 2004, identified by the alias BlueDelta, but even better known under the name IRON TWILIGHT...
Sometimes important things don't arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the...
San Francisco: January 9, 2007 There was something strange about the air, like when you know something's about to happen but you don't know what. Steve Jobs was on stage...
For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption...
When it comes to application security, there's rarely a single problem. It's almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the...
Password security and human behavior are more connected than we think. In previous episodes, we tried to shift our focus: passwords don't just protect systems, they tell stories about people....
Before delving into the analysis, it is worth pointing out that this contribution is the first part of a more extensive research. In the next article, we will explore the...
Five days in London, and I felt like I was living inside a permanent demo of the future. The sleek, convenient, frictionless one. The one where you do everything with...
This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable...
MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For...