Blog Directory
Directory Blog
A

Andrea Fortuna

Andrea Fortuna — Cybersecurity expert and digital forensics analyst

Cybersecurity expert, software developer, experienced digital forensic analyst, musician

Most organizations don't fail at security because they lack tools, they fail because they can't sustain attention at 2:00 AM.

andreafortuna.org

A cybersecurity blog that bridges the gap between hands-on technical analysis and strategic thinking. Andrea writes about everything from iOS forensics to building 24/7 security operations on small teams, often opening with real-world scenarios that pull you into complex topics. His European perspective on security regulation and infrastructure adds a dimension you won't find on most infosec blogs.

Written by Andrea Fortuna.

About This Blog
Activity

Very Active

Publishes multiple times per week

Followers

3

Category

Independent Blog

Languages

English

Feed Accessibility

How this blog's content is accessed through Blogs Are Back.

Full Content

RSS feed includes complete post content for reading in-app

Direct Access

Feed can be fetched directly from your browser

Direct Post Links

Post pages can be loaded directly in the reader

Embeddable

Posts can be displayed inline in the reader view

Latest Posts

Recent posts from Andrea Fortuna's RSS feed.

MalHunt gets a major overhaul: Volatility3, smarter YARA handling, and better error recovery

If you have been following my open-source work, you probably know MalHunt, the memory forensics tool I built to automate malware hunting on top of Volatility. Yesterday I pushed a significant batch of updates that, taken together, amount to a near-complete rewrite of the project. Here is what changed and why it matters. From a script to a proper Python package The most visible change is structural. The original malhunt.py was a single 317-line script: practical, but not particularly maintain...

Ten problems every Volatility2 analyst will hit when migrating to Volatility3

After years of daily use in incident response and forensic investigations, Volatility2 becomes part of muscle memory. Commands are typed by reflex, plugin behaviour is predictable, and the toolchain rarely surprises you. Moving to Volatility3 dismantles most of those assumptions at once. The rewrite is architecturally justified and the result is genuinely superior, but the migration path is littered with specific, repeatable problems that every experienced analyst hits in roughly the same order....

Face ID vs. Android Face Unlock: A Security Comparison

The hardware gap that defines the comparison Apple built Face ID around dedicated hardware that most competitors have never replicated at scale. The TrueDepth camera system, introduced with the iPhone X in 2017 and refined across every subsequent generation, uses a dot projector, an infrared camera, and a flood illuminator to cast more than 30,000 invisible infrared points onto the user’s face. The TrueDepth system then reads the distortion of those dots to generate a precise depth map, while a...

Audit-Proofing your NIS2 training plan: a strategic guide

Why training is no longer optional The NIS2 Directive (EU) 2022/2555 has fundamentally redefined what it means for a European organization to take cybersecurity seriously. Among its most significant shifts is the elevation of training from a recommended best practice to a binding legal obligation. Article 20 explicitly requires that management bodies of essential and important entities follow cybersecurity training, and encourages organizations to offer similar, regular training to their employ...

Privileged access management: risks and best practices for zero trust implementations

The strategic weight of privileged accounts In any enterprise environment, privileged accounts represent the highest-value target for attackers. These are not just administrator credentials; they encompass service accounts, DevOps pipelines, cloud management interfaces, and any identity with elevated permissions over critical systems. When one of these accounts is compromised, the consequences extend far beyond a single machine or dataset. Attackers can move laterally, escalate privileges, and...

Follow Andrea Fortuna

Whether you're a security practitioner or just trying to understand the threat landscape, Andrea breaks down complex security topics with real-world clarity.

https://andreafortuna.org/feed.xml