877.791.9571 |

About the Author:

Emanuele is a passionate information security professional. He's worked as tier-two security analyst in the Security Operation Center (Se.O.C. or S.O.C.) of one of the largest Italian telecom companies, as well as a code security specialist in one of the world's largest multinational corporations. Currently, he works as an information security manager at one of main facilities of an international organization. With a strong technical background, he specializes in offensive security, reverse engineering, forensic investigations, threats analysis and incident management. He holds a Bachelors degree in Computer Science and a Masters in Computer Security and Forensic Investigations. He also holds the following professional certifications: CISSP, MCSE+Sec, C|EH, E|CSA/L|PT, CIFI, CREA, Security+ and CCNA+Sec.
Cyberterrorism-sized

The Likelihood of Cyber-Terrorism Today

Introduction

The virtual space has over time become something of real importance for business, politics, work, communities and communications.

In becoming gradually more and more dependent and addicted to the Internet, […]

shellcode12222014

Pattern-Based Approach for In-Memory ShellCodes Detection

Introduction

During an analysis, it can be really useful to know some common instructions with which malware, and more specifically shellcodes, achieve their goals.

As we can imagine, these sets of […]

fileFormats12172013

Steganography and Steganalysis: Common Image Formats and LSB Part 2

JPEG

One of the most common image formats is JPEG. It surely deserves a particular discussion, and, in addition, it’s very frequently used as Cover Media, in association usually with […]

steganography12132013

Steganography and Steganalysis: Common Image Formats and LSB

Part 1: Introduction

The information revolution, which resulted in the Internet and in modern communication technologies, has pushed our society more and more toward the use and management of information […]

IPv6-Security07172013

IPv6 Security Overview: a Small View of the Future

Introduction

The current version of Internet Protocol is IPv4. This is used to send data over the Internet and makes interaction between different services possible. As all experts know, this […]

antiForensics-04022013

Anti-Forensics 2

For part one, click here
1. – Analysis Prevention and Memory Resident Execution

The second part of this document examines those that are the most advanced techniques regarding to the anti-forensics. […]

AntiForensics-03112013

Anti-Forensics – Part 1

Executive Summary

This document is a general summary on the most widely used techniques currently to hide or to make unrecoverable digital tracks of a crime in magnetic media. The […]

RedOctober-02072013

Hunting for “Red October”: Cyber-Espionage Toolkit Exploded – Part 2

Executive Summary

In the first part of this article, it was possible to see the instructions executed by the droppers of Red October. Such instructions are executed after the exploitation […]

RedOctober-02072013

Hunting for “Red October”: Cyber-Espionage Toolkit Exploded

Introduction

“Red October” appears to be a cyber-espionage toolkit discovered quite recently by Kaspkersky’s laboratories. The viral code seems to have targeted government agencies and institutions based in Europe, ex-USSR […]

HaveYouEver-sized

Have You Ever Seen the Red Spike? (D)DoS: Mitigation Strategies

Executive Summary

DDoS, or Distributed Denial of Service, is a cyber-attack in which an attacker tries to bring the functioning of a computer system that provides a service, such as […]

BatchWiper-sized

BatchWiper Analysis

BatchWiper is a very simplistic computer virus, but potentially very dangerous for the availability of the data contained within logical partitions managed by an infected system. It was discovered […]

piggy-bank-sized

Stabuniq In Depth

Trojan.Stabuniq was discovered very recently by Symantec.

This type of malware appears to be targeting financial institutions (especially U.S. banks).

Stabuniq is fundamentally an information-stealing Trojan and has already been found […]