Tag: RadioCSIRT

Spyware Targeting Secure Mobile Messaging Applications

Executive Summary: A recent CISA alert warns that multiple threat actors are leveraging commercial spyware to compromise users of end-to-end encrypted mobile messaging apps. These attackers employ sophisticated tactics – including malicious QR codes, zero-click exploits, and trojanized messaging apps – to gain unauthorized access to victims’ messaging accounts and intercept private communications. Once a…

Shai-Hulud worm infects over 800 npm packages and leaks developer secrets on GitHub

The JavaScript community is grappling with a new software supply-chain attack: a malware dubbed Shai-Hulud has poisoned hundreds of packages in the npm registry. This malicious campaign – referred to by its authors as “Sha1-Hulud: The Second Coming” – exceeds the scale of the worm’s first appearance in September 2025. Over the span of a…

CERT-UA Alert about UAC-0241

Executive Summary Between May and November 2025, threat actor UAC-0241 conducted a campaign against educational institutions and government bodies in eastern Ukraine. The attack involved a compromised Gmail account distributing a ZIP archive containing a malicious LNK that triggered an HTA → JS → PowerShell execution chain. This led to the deployment of LAZAGNE, several…

From Diplomatic Tension to Critical Incident

Analyzing the Cycle of Cyber Retaliation Executive Summary The correlation between geopolitical tensions and cyber threat intensity is well-established, yet its temporal and sequential mechanics follow a precise model that defense teams must master. Analysis of recent conflicts reveals a standardized threat lifecycle: For CERTs and CSIRTs: Monitoring geopolitical indicators must now trigger specific vigilance…

Mitigating Risks from Bulletproof Hosting Providers

Executive Summary In a coordinated international initiative, the ASD, CISA, FBI, and their partners released the “Bulletproof Defense” guide. This document goes beyond simple warnings; it provides a technical methodology to dismantle the tactical advantage of Bulletproof Hosting (BPH) providers. These actors are not merely lax hosts; they are architects of cybercrime, providing infrastructure resilient…

DNS4EU: Towards a Sovereign, Secure, and Privacy-Respecting European DNS

Executive Summary DNS4EU is an initiative by the European Union to deploy a public DNS resolution service that is free of charge, compliant with GDPR, and entirely operated within Europe. Launched in June 2025 after several years of preparation, this European DNS resolver aims to strengthen the EU’s digital sovereignty by providing an alternative to…

Microsoft Patch Tuesday – November 2025

Fixing 63 Flaws Including 1 Active Zero-Day You will find below my hot take on this historic Microsoft Patch Tuesday, following the official end of support for Windows 10… I hope you find it useful. Executive Summary Overview of the November 2025 Patch Tuesday On November 11, 2025, Microsoft released its monthly batch of security…

Comparative review of cybersecurity taxonomies used by CSIRTs, CERTs, and SOCs

Executive summary CSIRTs, CERTs, and SOCs rely on incident and threat taxonomies to classify, analyze, and share cybersecurity information consistently. This article compares the principal taxonomies in use—eCSIRT.net, ENISA’s Reference Incident Classification Taxonomy and Threat Taxonomy, FIRST’s CSIRT case classification guidance, MISP taxonomies, VERIS, and MITRE ATT&CK—covering their origins, structure, operational uses, strengths, limitations, and…

Microsoft Exchange Server On-Premises: Security Best Practices

In this article, I present a summary of the security best practices for Microsoft Exchange Server, directly inspired by the recommendations published by the NSA and CISA. These guidelines aim to strengthen the resilience of Exchange environments hosted in data centers — whether on-premises or hybrid — against current threats, including email account compromises and…