Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

marcoramilli.com

Marco Ramilli Web Corner

Get the latest updates from Marco Ramilli Web Corner directly as they happen.

Follow now 61 followers

Latest posts

Last updated over 1 year ago

Anthropic Unveils Groundbreaking Insights into Large Language Models

almost 2 years ago

The realm of artificial intelligence (AI) continues to expand, revealing new depths...

XZ Utils Backdoor (CVE-2024-3094): Personal Notes

about 2 years ago

In a surprising discovery that’s set the tech world abuzz, a hidden...

i-SOON Data Leak: Key Points

about 2 years ago

Introduction i-SOON (上海安洵), a prominent contractor for various Chinese government agencies such...

X Gold Badges: a new proliferating market

over 2 years ago

When I saw a threat actor hijacking the X account of Google's...

Technical Data Sheet: LOCKBIT 3.0

over 2 years ago

LOCKBIT 3.0 is a notorious Ransomware Group that was first identified on...

Technical Data Sheet: NoName057(16)

over 2 years ago

NoName057(16) is a notorious hacktivist group with a primary focus on targeting...

The Rising of Protestware During Times of War

over 2 years ago

In the ever-evolving landscape of cybersecurity threats, a disconcerting phenomenon has emerged...

Amazing Books Podcast

over 2 years ago

Hi folks,today I'm proud to share another episode of the "Amazing Books...

Understanding and Defending Against Microsoft 365 Attacks

over 2 years ago

As the use of Microsoft 365 continues to grow, cyber attackers are...

Malware Persistence Locations: Windows and Linux

over 2 years ago

Malware persistence is a crucial aspect of cyber threats that often goes...

Leading the uncertainty: the decision-driven approach

over 2 years ago

Many of my readers know me as a cybersecurity expert. More than...

2023 Breaches and Incidents: Personal Notes

almost 3 years ago

Introduction In today's digital landscape, the prevalence of cyber threats and incidents...