Coin Miner Attacks using Image File
An overview to spotlight an attack against Linux OS with goal to install a Monero Miner
Retrieve Personal Information using Boarding Pass Published on Social Networks
A post that show how people are prone to publish and share their personal information into social networks, without to have a clear vision of what an attacker can do using these information.
The Threat Behind an Italian Phishing Campaign
An overview on a Phishing campaign that hit Italy