• Blog

    I write here personal Analysis, Research, Projects and other

Coin Miner Attacks using Image File

An overview to spotlight an attack against Linux OS with goal to install a Monero Miner

Read More

Retrieve Personal Information using Boarding Pass Published on Social Networks

A post that show how people are prone to publish and share their personal information into social networks, without to have a clear vision of what an attacker can do using these information.

Read More

The Threat Behind an Italian Phishing Campaign

An overview on a Phishing campaign that hit Italy

Read More