I have been using Slack for many years and in many projects I have been able to appreciate its features. It is a very powerful tool that unfortunately has a weak point: the user 😦 Most people I know use it like Whatsapp or Sykpe. Failure to use the “threat” feature turns Slack channels into … Continue reading Slack is great if you use it well
Setup ESPHome
In the previous post we saw how to connect our ESP2282 board via USB to our WSL. In this post we see how to use ESPHome into our WSL. If everything worked we will have the following configuration. As you can see we have the "ttyUSB0" device, this represents our board. First we install the … Continue reading Setup ESPHome
Connect USB device to WSL
I decided to check out ESPHome. This is a very interesting project and I think I will write something about it here in the future too. For now, however, I thought I'd write a first quick post on how to connect a USB device to WSL. In fact, my workstation is a Windows 11 machine … Continue reading Connect USB device to WSL
Phishing attack against Wio
To be honest I didn't know this bank. Today Matrix identified these two threats and so I did a little research into who they are. It is a bank based in the United Arab Emirates. Looking at the wio.io website the first thing that struck me was that in the management section they don't have … Continue reading Phishing attack against Wio
Phishing attack against Facebook users
This morning Matrix located a file containing Facebook user credentials stolen using a phishing attack. The malicious site is "ab-portalwiedza.xyz". 16 hours after the report of the attack, the site is still online even if the file containing the credentials is no longer visible, I imagine because the criminal changed its name. The site presents … Continue reading Phishing attack against Facebook users
Intesa San Paolo phishing kit
A few hours ago Matrix identified a phishing kit targeting customers of the Italian bank Intesa San Paolo (intesasanpaolo[.]com). This site is hosted on cprapid[.]com, the full url is weblntesasanpaolo[.]35-180-129-166[.]cprapid[.]com. I just report it as malicious on urlscan.io. The kit code is a mess 😦 I don't think the low quality indicates attempts at evasion, … Continue reading Intesa San Paolo phishing kit
An Italian solution
This morning I wanted to write a short post on a phishing site, which was also poorly made, but which using IPFS could be a little more interesting than the others. The site is an attack (targeted or not I don't know) against some company that wants to become a supplier to the US government.The … Continue reading An Italian solution
Attack against Zoom
Today I'll tell you about an attack detected a few hours ago by Matrix and reported on urlscan.io. This is a fairly complex attack against Zoom. The attackers registered on Namecheap a domain (us06webzoomus[.]pro) reminiscent of Zoom subdomains and deployed a series of files. Here we find three malware (Android and Windows), static content (scripts, … Continue reading Attack against Zoom
Free RAT
A little while ago I came across this website: hxxps://domin-remote[.]online The domain was registered yesterday via hostinger. To date it has not been reported. Matrix reported it on urlscan.io 15 hours ago. Domain Name: DOMIN-REMOTE.ONLINERegistry Domain ID: D424887618-CNICRegistrar WHOIS Server: whois.hostinger.comRegistrar URL: https://www.hostinger.com/Updated Date: 2024-01-15T10:57:55.0ZCreation Date: 2024-01-15T10:57:50.0ZRegistry Expiry Date: 2025-01-15T23:59:59.0ZRegistrar: HOSTINGER operations, UABRegistrar IANA ID: … Continue reading Free RAT
Assemblaggio P-51D Mustang
Rieccoci con un altro post su come ho assemblato un nuovo modello realizzato da Gianluca. Dopo aver assemblato il BF109 oggi vediamo il P-51D Mustang. Si tratta anche in questo caso di un kit realizzato in polestirele ricavato da lastra, quindi buona parte dei procedimenti sono già stati spiegati nel post del BF109, vi consiglio … Continue reading Assemblaggio P-51D Mustang
You must be logged in to post a comment.