How to check Pegasus Spyware on your iPhone

A recent report by The Pegasus Project, a consortium of non-profit organizations and various journalists, claimed to have discovered a leak of 50.000 phone numbers that likely belong to users who might be victims of the Pegasus spyware, developed by the Israeli technology firm NSO. Amnesty International, part of the group,…

Some thoughts about Stuxnet

Some days ago, during a brief memory analisys demonstration with Volatility, I’ve used a memory dump of a system infected with the “old-but-gold” Stuxnet. But, one of the spectators asked me additional info about this malware, so I decided to collect some informations about the story of this “iconic” malware…

How “Process Ghosting“ works

The Elastic Security team recently revealed a new technique for malware obfuscation and evasion called Process Ghosting, that allows tampering of in-memory mappings of executable files on Microsoft Windows. The technique [1] is the evolution of already known attack methods such us as Process Doppelgänging and Process Herpaderping, and could…
1 2 3 14