Blog Entries

16. 01. 2025 Simone Ragonesi Offensive Security, Red Team

Inside the Red Team Toolbox: Linux Info-Gathering

In the realm of red teaming, rapid and efficient information gathering is very important. To streamline this process, we’ve developed Vermilion, a lightweight post-exploitation tool for the rapid collection and optional exfiltration of sensitive data from Linux systems. A significant percentage of computational workflows worldwide run on GNU/Linux. Primarily used in servers and increasingly in…

Read More
10. 01. 2025 Simone Ragonesi AI, Cloud, Offensive Security, Red Team

Stay ahead of Cyber Threats: Redefining Security for a Rapidly Changing Digital World

As the digital arena evolves at lightning speed, so do the tactics of those seeking to breach it. Traditional security measures are no longer enough for today’s increasingly sophisticated cyber threats. The perimeter of technological infrastructure is no longer carved in stone – it shifts continuously, reflecting systems that are more distributed and challenging to…

Read More
07. 01. 2025 Massimo Giaimo Threat Intelligence

Gravy Analytics breached (to be confirmed)

WARNING: This post is constantly updated based on new evidence related to the data breach. The famous company Gravy Analytics seems to have suffered an attack. In fact, inside the XSS forum, a post was published, on Sunday night by the user nightly, reporting some evidence of what appears to be a really important exfiltration….

Read More
31. 12. 2024 Luca Zeni Blue Team, SEC4U, Uncategorized

That Time I Brought a Velociraptor and a Chainsaw into the SOC

Yes, you read that title right. Today I’m going to tell you about the time I went on a hunt to bring a velociraptor and a chainsaw into the Würth Phoenix Security Operations Center. I know that it might sound strange to many and few will believe it, but I’m sure that once you get…

Read More
30. 12. 2024 Beatrice Dall'Omo Red Team, SEC4U

Exploring Authenticated Scans in Greenbone

While traditional vulnerability scanning techniques provide valuable insights from the outside, authenticated scans offer a deeper, more comprehensive understanding of system security by providing more vulnerability details on the scanned system from an internal perspective.  By leveraging valid system credentials, Greenbone’s authenticated scans provide critical insights about system configurations, software versions, and potential internal weaknesses…

Read More
30. 12. 2024 Beatrice Dall'Omo Blue Team, Red Team, SEC4U

Red and Blue Team Cooperation: Attack to Improve

Nowadays attacks evolve over time and threat actors are following different ways to reach the same objectives. This could represent a problem on the defensive side. How can you always be up-to-date and ready to detect, but then when a vulnerability is exploited be able to act in several ways depending on the threat actor?…

Read More
23. 12. 2024 Beatrice Dall'Omo Red Team, SEC4U

Developing Integrations for Greater Efficiency: Jira and Invicti

In today’s digital landscape where cyber threats are constantly evolving, recurring vulnerability scanning is not only a best practice, but a strategic imperative with the aim of minimizing exposure to potential risks. Regular vulnerability scanning helps identify weaknesses in systems, applications and infrastructures, allowing them to be addressed in a timely and strategic way before…

Read More
25. 11. 2024 Mattia Codato ctf-writeups, Events

WP CTF 2024: Another Successful Edition!

The 2024 edition of the WP CTF has ended, and we are thrilled to announce its resounding success! This year, approximately 80 participants formed teams from across Europe, including Greece, Germany, Austria, and the Netherlands. Staying true to tradition, WP CTF 2024 featured a Jeopardy-style competition with diverse categories such as AI, Cryptography, OSINT, Web,…

Read More
18. 11. 2024 Lorenzo Bevilacqua Development, Threat Intelligence

Scaling SATAYO: OSINT Research with Apache Airflow

Originally developed as a proof of concept, SATAYO was designed to gather and analyze OSINT (Open Source Intelligence) data on a single machine. Initially, the platform functioned as a single-threaded script, and scaling was only considered later. As SATAYO’s capabilities evolved to meet the needs of more clients and monitor a greater number of domains,…

Read More
08. 11. 2024 Luca Zeni Blue Team, SEC4U, Threat Intelligence

SATAYO And SOC: Exchanging Data For Better Insight

In this post, we’ll explore the synergy between a Cyber Threat Intelligence (CTI) platform and a traditional Security Operations Center (SOC) service. For those interested in the topic, I recommend reading my previous article, where I demonstrated a concrete example of integration between our SIEM and SATAYO, the CTI platform we use in our SOC….

Read More
01. 11. 2024 Massimo Giaimo Threat Intelligence

Our Contribution to Mitre Att@ck

Many of you have probably already heard about the MITRE ATT&CK framework. This framework is an important point of reference at the international level and is used within thousands of projects, detection rules, platforms. The Adversarial Tactics, Techniques, and Common Knowledge is a guideline for classifying and describing cyberattacks and intrusions. It was created by…

Read More
10. 09. 2024 Massimo Giaimo Blue Team, SEC4U, SOCnews

SOC News | September 10 – New RaaS Group BloodForge

The team behind the popular underground forum BlackForums has announced, on its Telegram channel, that it has formed a new pact with the BloodForge group. From this pact was born The Brotherhood, an organization that aims to provide a RaaS (Ransomware as a Service). The new BloodForge channel then presented the features and capabilities of…

Read More
30. 08. 2024 Daniel Degasperi Blue Team, SEC4U

A Concrete Example of ES|QL and SOC Detection Rules

The purpose of this article is to show a real-life case study of the integration of the new Elastic ES|QL language within the detection rules used by the SOC to detect cyber threats. Overview ES|QL (Elasticsearch Query Language) is an SQL-like query language developed by Elastic specifically for querying time series and event data stored…

Read More
05. 08. 2024 Simone Ragonesi Artificial Intelligence, Offensive Security, Red Team

Exploiting the Matrix: Offensive Techniques for Attacking AI Models

There’s no way around it: Artificial Intelligence is reshaping our world in profound ways, and it’s here to stay. In recent years we’ve entered a golden age for specialized hardware and algorithms suited to enhance machine learning models. These technologies are now bringing significant advances across various sectors, from finance to healthcare, from e-commerce to…

Read More
31. 07. 2024 Gianluca Piccolo ctf-writeups

CTF Exploit: Not A Democratic Election

Hello everyone, today I’d like to show you how we exploited the Not a democratic election challenge from HTB Business CTF 2024. This challenge is of type Blockchain and is based on Solidity Smart Contracts for Ethereum. Since the official exploit uses Foundry, and I couldn’t run Foundry on my workstation, I’d like to report…

Read More

Archive