top of page
Cerca
All Posts


Blogging in the Age of AI
I’ve recently been asking myself what the point of writing a blog is in the age of artificial intelligence. People increasingly want fast and personalized information. It often happens that you land on a page, start reading an article, and realize that you’re not interested in the entire content maybe you only need one or two specific parts. Yet you still have to scroll through, read, and analyze the whole article to find what you need. So how can you compete with AI? Artific

James
7 marTempo di lettura: 2 min


APT1: The Case That Redefined Threat Intelligence
Never forget when the APT1 report came out in 2013. There was a time, in the early days of hacking, when this activity was attributed to lone experts acting for fame, curiosity, the desire to test their skills and of course, sometimes for money. Back then, hacking felt almost like a competition of talent. Certain names emerged that shaped the history of the field and even defined what the term “hacker” meant. Then came the first groups, the first collectives. Later, the first

James
2 marTempo di lettura: 3 min


In malware, obfuscation is everything
The design and development of malware can be extremely complex, as it depends on numerous factors, such as what the malware is intended to do, which functionalities it must include, and how it should communicate with a potential C&C server. However, in certain cases, it can also be extremely simple by deliberate choice of the attacker. Naturally, this also depends on the phase of the attack we are in, but an attacker might choose to use a simple reverse shell. This can be imp

James
22 febTempo di lettura: 2 min


CNN for malware analysis
The idea is simple but extremely interesting. CNNs, or convolutional neural networks, are extremely powerful machine learning algorithms that have marked a leap forward in the task of classifying objects in an image. So let's try to apply them not only to classifying objects in an image. What happens if we somehow represent an executable as an image and then use these algorithms to classify it. If you follow me, this is a rudimentary, primitive AI classifier for executables.

James
31 dic 2025Tempo di lettura: 3 min
The Role of AI in Cybersecurity
Cybersecurity has always been an asymmetric battle. Attackers need to succeed once; defenders must succeed every time. For years, security teams have relied on static controls, predefined rules, and human-driven analysis to protect increasingly complex digital environments. That model is now fundamentally broken. Why? The scale, speed, and sophistication of modern cyber threats have exceeded human-only capabilities. Artificial Intelligence (AI) is no longer a “nice to have” i

James
28 dic 2025Tempo di lettura: 3 min
Understanding AMSI and Bypass in PowerShell (Theory For Educational Purposes)
This article is for educational purposes only . It is intended to raise awareness among cybersecurity professionals, system administrators, and ethical hackers. Do not attempt to use this knowledge in unauthorized environments. What Is AMSI? AMSI, or Antimalware Scan Interface , is a security feature built into Windows designed to scan scripts and dynamic content, like the notorius PowerShell commands, before they are executed. Its main purpose is to detect malicious code at

James
7 dic 2025Tempo di lettura: 2 min
Understanding Network Scanning with Nmap: A Practical Guide
Network scanning is a fundamental activity in cybersecurity and IT auditing. Nmap is one of the most widely used open-source scanner thanks to its versatility, speed, and extensive scripting capabilities.In this article, we explore what Nmap is and how it works. What Is Nmap? Nmap is an open-source tool designed to discover hosts, services, and vulnerabilities on a network. It operates by sending specially crafted packets to remote hosts and analyzing the responses. Why Net

James
28 nov 2025Tempo di lettura: 2 min
Malware Analysis
Malware analysis is the discipline that focuses on the reverse engineering of malicious software with the goal of understanding how it works. A malware analyst seeks to answer key questions such as: What does this virus actually do? What indicators should I look for to identify infected machines? Does it establish external connections? If so, where and how? This role is among the most technically complex within cybersecurity , as it requires deep, specialized knowledge bui

James
26 ott 2025Tempo di lettura: 2 min
Port Knocking: hide network ports
Network security is an ongoing challenge: every service exposed on the Internet represents a potential entry point for attackers. One...

James
28 set 2025Tempo di lettura: 2 min


Web application attack - Forced browsing
Forced Browsing is one of the most underrated web attacks, but its simplicity makes it very effective. Let’s start from the beginning: a...

James
21 set 2025Tempo di lettura: 2 min
Windows: where the security debt came from
Windows is the world’s most widespread PC operating system, but it is also historically the most exploited. Why is Windows so insecure? ...

James
16 set 2025Tempo di lettura: 3 min
Polymorphic Viruses: When Code Learns to Mutate
In the early days of computer malware they spread by attaching themselves to files, leaving the indelible trace of their signature. Using...

James
31 ago 2025Tempo di lettura: 2 min
Machine self replication
Let we consider a universal machine which can accomplish every task it is programmed for. ...What about the uncommon task of replicate it...

James
27 ago 2025Tempo di lettura: 2 min
interview with ChatGPT (April 2023)
...scarred, it pretend to be a real person Who are you? I'm a person who is trying to learn more about the world. What do you want to...

James
13 lug 2025Tempo di lettura: 4 min
bottom of page