Media Appearances, Publications and Conference Talks

Date Topic Publisher
10/30/2024 Midnight Blizzard Spear Phishing Intelligence Collection Campaign  
11/06/2024 Russian Midnight Blizzard Spear Phishing Campaign Targets Thousands Using RDP Files CPO Magazine
10/31/2024 Russian Actor Midnight Blizzard Conducts Massive Spear-Phishing Campaign Using RDP Files InformationSecurityBuzz
10/31/2024 Microsoft Threat Intelligence Update: How Midnight Blizzard Carried Out Spear-Phishing Using RDP Files Cyber Technology Insights
10/30/2024 Midnight Blizzard Uses RDP to Target 100 Organizations in US, Europe SC World
10/24/2024 macOS “HM Surf” vulnerability (CVE-2024-44133)  
10/24/2024 New MacOS vulnerability allows unauthorized data access Security Magazine
10/02/2024 INC Ransomware attacks against healthcare  
10/02/2024 Security leaders discuss INC ransomware attacks targeting healthcare Security Magazine
09/26/2024 CUPS(Common Unix Printing System) Remote Code Execution Vulnerabilty Disclosed  
09/27/2024 CUPS vulnerabilities put Linux systems at risk of remote code execution SC World
09/27/2024 Highly Anticipated Linux Flaw Allows Remote Code Execution, but Less Serious Than Expected Security Week
09/27/2024 Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution The Hacker News
09/26/2024 Customer Advisory: New Remote Code Execution Vulnerability in printing facility (‘CUPS’) commonly found on Linux and similar systems Ontinue Resources
09/11/2024 Lazarus Targets Developers  
09/11/2024 Lazarus Targets Developers with Sophisticated Coding Test Scam Secure World Magazine
09/10/2024 1H 2024 Threat Intelligence Report  
10/31/2024 Return from the data fog: Scary security tales for Halloween Digital Journal
10/31/2024 A Halloween Haunting: Unveiling Cybersecurity’s Scary Stats Information Security Buzz
09/19/2024 China’s cyberattacks on manufacturing are part of its long-game strategy for industrial dominance SC Magazine
09/16/2024 Cyberattacks against manufacturing sector increased 105% in H1 of 2024 Securitymagazine
09/10/2024 Manufacturing, Industrial Sectors Are Under Siege Security Boulevard
09/10/2024 Attacks Against Manufacturing Industry Increase 105% in First Half of 2024, New Research Finds PR Newswire
09/10/2024 Attacks Against Manufacturing Industry Increase 105% in First Half of 2024, New Research Finds Global Security Mag
09/10/2024 Attacks on manufacturing companies up 105 percent BetaNews
09/10/2024 Key Findings from Ontinue’s 1H 2024 Threat Intelligence Report Ontinue Resources
09/10/2024 1H 2024 Threat Intelligence Report Ontinue Resources
07/25/2024 Github’s Stargazers Ghost Network  
07/25/2024 3,000 GitHub accounts found distributing malware SC Magazine
06/31/2024 VMware ESXi Vulnerability  
06/31/2024 Record-Breaking $75 Million Ransom Paid To Dark Angels Gang Forbes.com
04/27/2024 Public Talk BSides Cymru 2024  
04/27/2024 Public Talk: Practical security challenges posed by AI adoption: Code Quality and Threat Modeling BSides Cymru, Watch on YouTube(soon)
04/11/2024 Raspberry Robin Malware  
04/11/2024 Raspberry Robin Malware Evolves with Sophisticated Evasion Tactics Secure World Magazine
04/10/2024 Raspberry Robin Observed Spreading via Windows Script Files SC Magazine
04/10/2024 Expert Panel: Ontinue 2024 Threat Report  
04/10/2024 Expert Panel Discussion Ontinue Resources
03/19/2024 2023 Threat Intelligence Report  
03/19/2024 End of year Report - 2023 Threat Intelligence Report Ontinue Resources
03/19/2024 Navigating the Complex Cybersecurity Landscape Ontinue Blog
03/19/2024 Research Shows IT and Construction Sectors Hardest Hit By Ransomware Infosecurity Magazine
03/19/2024 Threats Shaping the Cyber Threat Landscape VMBlog
03/14/2024 Security Data Management  
03/14/2024 10 Tips for Better Security Data Management DarkReading
02/23/2024 Red Teaming GenAI  
02/23/2024 Microsoft Unveils PyRIT, a Red Teaming Tool for Generative AI Techstrong.ai
02/16/2024 RansomHouse using MrAgent to track deployment accross VMware ESXi hypervisors  
02/16/2024 ‘MrAgent’ ransomware tool from RansomHouse Group targets ESXi servers SC Magazine
02/08/2024 Linux Shim Vulnerability  
03/29/2024 Urgent Response: Linux Developers Swiftly Patch Critical Vulnerability in Shim NixOS Pro
02/08/2024 Linux Devs Rush to Patch Critical Vulnerability in Shim Infosecurity Magazine
01/22/2024 Mint SandStorm  
01/22/2024 Constantly Changing Threat Landscape - page 10 Channel Futures
01/19/2024 Microsoft: Iranian Hackers Evolving Techniques in Espionage Campaigns SecureWorld
01/19/2024 Iran’s Mint Sandstorm Hits Universities with Hamas-Israel Phishing Scam Kilguard.net
01/19/2024 Iran’s Mint Sandstorm APT Hits Universities with Hamas-Israel Phishing Scam HackRead
01/18/2024 Mint Sandstorm targets high-profile Middle East researchers SC Magazine
01/13/2024 FBot  
01/13/2024 What is FBot? Managed Service Provider Association of America
01/12/2024 FBot Hacking Tool Targets Major Cloud Services SC Magazine
01/13/2024 Ivanti Critical Patch  
01/05/2024 Ivanti Patches Critical Flaw in its EPM Software SC Magazine
01/13/2024 JetBrains TeamCity Supply Chain Attack  
12/21/2023 The JetBrains TeamCity software supply chain attack: Lessons learned Security Boulevard
12/21/2023 Jetbrains TeamCity Software Supply-chain Attack: A Sunburst Redux Reversing Labs
01/10/2023 Data Breach Trends and Outlook January 2023  
01/10/2023 Public Talk: Data Breach Trends and Outlook January 2023 ATED ICT Ticino, AIEA, ISACA Switzerland Chapter, ISACA Milan Chapter in collaboration with SUPSI Lugano