Emanuele De Lucia

Emanuele is a passionate information security professional. He's worked as tier-two security analyst in the Security Operation Center (Se.O.C. or S.O.C.) of one of the largest Italian telecom companies, as well as a code security specialist in one of the world's largest multinational corporations.

Currently, he works as an information security manager at one of main facilities of an international organization. With a strong technical background, he specializes in offensive security, reverse engineering, forensic investigations, threats analysis and incident management.

He holds a Bachelors degree in Computer Science and a Masters in Computer Security and Forensic Investigations. He also holds the following professional certifications: CISSP, MCSE+Sec, C|EH, E|CSA/L|PT, CIFI, CREA, Security+ and CCNA+Sec.

Emanuele De Lucia

IPv6 security overview: a small view of the future [updated 2019]

  The current version of Internet Protocol is IPv4. This is used to send data over the Internet and makes interaction between different services poss

Dridex Downloader Analysis

Introduction Yesterday I received in my company inbox an email with an attached .xlsm file named D92724446.xlsm coming from Clare588@78-83-77-53.spectrumnet.

The Likelihood of Cyber-Terrorism Today

Introduction The virtual space has over time become something of real importance for business, politics, work, communities and communications.[pkadzone zone=

Pattern-Based Approach for In-Memory ShellCodes Detection

Introduction During an analysis, it can be really useful to know some common instructions with which malware, and more specifically shellcodes, achieve their

Steganography and Steganalysis: Common Image Formats and LSB Part 2

JPEG One of the most common image formats is JPEG. It surely deserves a particular discussion, and, in addition, it's very frequently used as Cover Media, in

Steganography and Steganalysis: Common Image Formats and LSB

Part 1: Introduction The information revolution, which resulted in the Internet and in modern communication technologies, has pushed our society more and mor

Anti-Forensics 2

For part one, click here[pkadzone zone="main_top"] 1. - Analysis Prevention and Memory Resident Execution The second part of this document examines those t

Anti-forensics - Part 1

This document is a general summary on the most widely used techniques currently to hide or to make unrecoverable digital tracks of a crime in magnetic me

Hunting for “Red October”: Cyber-Espionage Toolkit Exploded

Introduction[pkadzone zone="main_top"] "Red October" appears to be a cyber-espionage toolkit discovered quite recently by Kaspkersky's laboratories. The vir