North Korea’s cyberwarfare and its cyber army (part one)
Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to
Making the cyber world a safer and better place: an interview with W1ntermute
Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and
Ada Lovelace and Charles Babbage, pioneers of programmable computing
Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction – Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering,
Dharma/Crysis: Overview and adversary tracking
Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload
Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)
Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections – often instigated through phishing emails, it’s very important/crucial to take proactive measures to
LockBit: The Bluff of Double Extortion Against the Federal Reserve
RHC Dark Lab - June 26th, 2024
In recent years, the cybersecurity landscape has been dominated by the growing threat posed by ransomware groups. Among these, LockBit has emerged as one of the most notorious and feared....
Xehook Stealer: The Rise and Sale of a Formidable Stealer Malware
Pietro Melillo - June 26th, 2024
Introduction Xehook Stealer is a sophisticated malware targeting Windows operating systems, first discovered in January 2024. Within a year, Xehook has rapidly gained notoriety for its advanced data collection capabilities...
DataLeak Microsoft: 4GB of Microsoft PlayReady Code Made Public!
Pietro Melillo - June 26th, 2024
On June 11, a Microsoft engineer inadvertently made 4GB of internal code related to Microsoft PlayReady public. The information leak occurred on the Microsoft Developer Community, a forum dedicated to...
Linux Kernel UAF 0-day Vulnerability on sale in the Dark Web
RHC Dark Lab - June 25th, 2024
Recently, a security alert shaked the infosec environment: A malicious actor has announced the sale of Use After Free (UAF) 0-day vulnerability affecting the Linux Kernel on the well-known darknet...
Sign up for the newsletter