Mario Raciti ๐Ÿง๐Ÿ›ก๏ธ

87 Followers
100 Following
34 Posts

๐Ÿฅท๐Ÿผ Cyber Security Engineer ๐Ÿ›ก๏ธ
๐ŸŽ“ Almost PhinisheD ๐Ÿง
๐Ÿ‘จ๐Ÿผโ€๐Ÿ’ป Threat Modelling Specialist ๐Ÿ“

โ€น#cybersecurityโ€ข#CTIโ€ข#AntiForensicsโ€ข#LLMAutomationโ€บ

Website ๐Ÿฅท๐Ÿผhttps://tsumarios.github.io/
Blog๐Ÿ›ก๏ธhttps://tsumarios.github.io/blog
Github ๐Ÿ‘จ๐Ÿผโ€๐Ÿ’ปhttps://github.com/tsumarios
Twitter ๐Ÿฆhttps://twitter.com/tsumarios

๐Ÿ”ฅ๐Ÿช„ Obliviate Shredder ๐Ÿ’€ is a secure anti-forensics tool that obliterates files and folders beyond recovery. Inspired by the "Obliviate" spell from Harry Potter, this tool ensures that no digital trace remains after shredding.

Check it out: https://github.com/tsumarios/Obliviate-Shredder

#cybersecurity #privacy #antiforensics #shred #digitaltraces #python #script

GitHub - tsumarios/Obliviate-Shredder: Obliviate Shredder is a secure anti-forensics tool that obliterates files and folders beyond recovery.

Obliviate Shredder is a secure anti-forensics tool that obliterates files and folders beyond recovery. - tsumarios/Obliviate-Shredder

GitHub

๐Ÿš—๐Ÿ”’ Call for Papers: Automotive Cyber-Security Workshop (ACSW'25) ๐Ÿ”’๐Ÿš—

๐Ÿ“ When: June 30, 2025 (Pre-conference workshop)

๐Ÿ“ Where: Venice, Italy

๐Ÿ“ Co-located with: IEEE EuroS&P 2025

Contribute your research on the cutting edge of automotive cybersecurity!

๐Ÿ—“๏ธ Submission Deadline: February 3, 2025 (AoE)

๐Ÿ”— Details & Submissions: https://acsw.unimore.it

Topics include, but are not limited to:

  • Hardware security and privacy in automotive components

  • Forensic analysis of automotive components

  • Firmware analysis and vulnerability assessment in automotive contexts

  • Reverse engineering of automotive components and proprietary protocols

  • Privacy-preserving applications in modern vehicles

  • Secure and privacy-preserving communications for in-vehicle communication protocols

  • Intrusion detection and prevention systems for automotive systems

  • Replication and Reproduction of security and privacy-preserving solutions for automotive systems

  • Secure and privacy-preserving communications for Vehicle-to-Vehicle (V2V) and Vehicle-to-Everything (V2X) applications

  • Secure and privacy-preserving applications in Cooperative Intelligent Transportation Systems (C-ITS)

  • Security and privacy for automotive-related infrastructures

  • Security and privacy in automotive-related industries

  • Vulnerability assessment and attack simulations of automotive systems

[NEW TRACK] Replication and Reproduction: inviting studies that confirm, challenge, or clarify the findings of previous research.

Share with anyone who might be interested!

#AutomotiveCyberSecurity #CyberSecurity #CallForPapers #IEEEEuroSP #Research #CfP #Privacy #Automotive

ACSW'25 - Workshop on Automotive Cyber Security

๐Ÿš€Check out my latest blog post! ๐Ÿ“

โšกHow to Set Up WireGuard without Getting Headaches

๐Ÿ”— https://tsumarios.github.io/blog/2024/07/28/how-to-set-up-wireguard-without-getting-headaches/

#WireGuard #VPN #RaspberryPi #RedHat #TechTutorial #networking #cybersecurity #privacy #blog

How to Set Up WireGuard without Getting Headaches

This blog post provides a clear, step-by-step guide to setting up WireGuard on a Raspberry Pi running Red Hat-Compatible OSs and configuring an Android device to connect to it โ€• without headaches!

tsumariosโ€™ blog
(Gen)AI4CySec

This blog post introduces you to the (Gen)AI4CySec project, which highlights the practical applications of Generative AI (GenAI) in cybersecurity.

tsumariosโ€™ blog

๐Ÿ”’๐Ÿ”Thrilled to announce that our paper titled "Supporting Criminal Investigations on the Blockchain: A Temporal Logic-based Approach" accepted at #ITASEC24 is now available online!

๐Ÿ”—https://researchgate.net/publication/379927973_Supporting_Criminal_Investigations_on_the_Blockchain_A_Temporal_Logic-based_Approach

#Blockchain #Cybersecurity #CriminalInvestigations #RaaS #CTI #Ransomware #DFIR #research

Check out my latest blog post!

A Primer on Cryptocurrency Investigation and Forensics

An introductory exploration of Cryptocurrency Investigation and Forensics, including challenges posed by money laundering techniques and the role of blockchain intelligence and taint analysis in unveiling concealed financial activities, with a demo on a real-world RaaS case.

#cybersecurity #security #infosec #DFIR #crypto #blockchain #bitcoin #OSINT #maltego #raas #ransomware #moneylaundry #forensics #investigation

https://tsumarios.github.io/blog/2023/09/02/a-primer-on-cryptocurrency-investigation-and-forensics/

A Primer on Cryptocurrency Investigation and Forensics

An introductory exploration of Cryptocurrency Investigation and Forensics, including challenges posed by money laundering techniques and the role of blockchain intelligence and taint analysis in unveiling concealed financial activities, with a demo on a real-world RaaS case.

tsumariosโ€™ blog

Looks like a constellation โœจ
Actually, it's a money flow related to a LockBit 3.0 ransom ๐Ÿ’ฐ

#cybersecurity #security #infosec #DFIR #crypto #blockchain #bitcoinโ€ฏโ€ฏโ€ฏ #ransomware #analysis #research #investigation #osint #CTI #intelligence

ENISA published its first cyber threat landscape report dedicated to the transport sector

#cybersecurity #news #security #infosec #threat #report

https://www.enisa.europa.eu/news/understanding-cyber-threats-in-transport

Understanding Cyber Threats in Transport

The European Union Agency for Cybersecurity (ENISA) publishes its first cyber threat landscape report dedicated to the transport sector.

ENISA

The extended version of #AILA has been accepted by #IEEE #OpenAccess #Journal.

Learn more on how to simplify the #riskassessment process by leveraging #NLP and #MachineLearning

๐Ÿ”—https://ieeexplore.ieee.org/document/10044683

#research #cybersecurity #likelihood #subjectivity #automated #methodology

The AILA Methodology for Automated and Intelligent Likelihood Assignment in Risk Assessment

This article recognises the widespread application of risk assessment in ICT and aims at reducing the influence of human subjectivity and distraction by means of a methodology for the Automated and Intelligent Likelihood Assignment (AILA). The AILA Methodology, with its various components, applies when risk assessment proceeds exclusively upon information stated in a policy coming as a text document. This scenario is extremely common through small to medium sized institutions. Among the main contributions of this article lies the AILA Entity Extractor, which facilitates the risk assessor in the identification of entities, then of assets, from a given policy. Then, the AILA Classifier automates the assignment of likelihood values to given threats for assets. Moreover, the synergy of AILA with an existing tool for risk assessment demonstrates how to achieve more objective likelihood assignments. AILA is general in support of any risk assessment and, for the sake of demonstration, is applied to assess the privacy risk induced over physical persons by three real-world manufacturers from the automotive domain, namely Toyota, Mercedes and Tesla. AILA is also validated against a risk assessment methodology by ENISA, thereby confirming effectiveness and efficiency of the new methodology (which is dramatically more automated than ENISAโ€™s). AILA combines and consolidates together several techniques in an unprecedented fashion, including Natural Language Processing by summarisation and entity recognition, dataset labelling by appeal to the ToS;DR service, and fully-supervised Machine Learning and regression analysis. Finally, to contribute to open knowledge, the general, executable components of AILA, the AILA Entity Extractor and the AILA Classifier are released open source along with the the privacy-specific components, the AILA Privacy Dataset and the AILA Privacy Model.

How to Capture a PCAP for your Hungry Wireshark

Some notes on how to capture network packets in a .pcap format, so you can feed your hungry Wireshark.

tsumariosโ€™ blog