-
Archives
- March 2026
- February 2026
- January 2026
- January 2025
- August 2024
- January 2024
- December 2023
- September 2023
- July 2023
- March 2023
- August 2022
- January 2022
- October 2021
- October 2020
- May 2020
- March 2020
- November 2018
- September 2017
- October 2016
- December 2015
- September 2015
- January 2015
- November 2014
- July 2014
- April 2014
- March 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- November 2012
- October 2012
- July 2012
- June 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
-
Meta
Author Archives: Simon Roses
Professional Vibe Coding vs. Vibe Coding: Why Developers Should Embrace It (On Their Own Terms)
Read Time: 10 minutes TL;DR Vibe coding (letting AI generate entire applications from natural language prompts) has exploded in popularity. For non-coders, it is a revolution: suddenly anyone can build software. But the conversation usually stops there, as if vibe … Continue reading
Posted in AI, Pentest, Security, Technology, Threat Modeling
Tagged AI, ai-security, AppSec, DevSecOps, ProfessionalVibeCoding, Software Security, VibeCoding
Leave a comment
AI Agent Skill Poisoning: The Supply Chain Attack You Haven’t Heard Of
Read Time: 15 minutes TL;DR Security professionals are well acquainted with npm supply chain attacks, PyPI package poisoning, and the infamous xz backdoor. But a new attack vector is emerging that flies under the radar—one that is arguably more dangerous … Continue reading
Posted in AI, Pentest, Privacy, Security, Technology
Tagged agent-security, AI, ai-security, Application Security, openclaw, pentesting, Skill, supply-chain
Leave a comment
The Shadow Twin Threats: When AI and Vibe Coding Go Rogue in Your Network
Read Time: 15 minutes TL;DR Your IT department doesn’t know it yet, but someone in marketing just spun up an Ollama server to run a local LLM. Finance is building a custom payroll app with Cursor. And that NVIDIA DGX … Continue reading
Posted in AI, Pentest, Privacy
Tagged AI, Application Security, Software Security, Vibe Coding
Leave a comment
My Experience Using OpenClaw: A Security Professional’s Journey
Read Time: 12 minutes TL;DR OpenClaw has transformed how I work as a cybersecurity consultant and developer. After two weeks of daily use, I’ve automated email management, built custom security tools overnight, and integrated AI into my pentesting workflow—all while … Continue reading
Posted in AI, Pentest, Security, Technology
Tagged Agents, AI, OpemClaw, Penetration Testing
Leave a comment
Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum 2026 (Part 3)
Disclaimer: Everything described here is pure imagination and any resemblance to reality is coincidental. This document is intended for security professionals to develop defensive countermeasures. The author is not responsible for the consequences of any action taken based on the … Continue reading
Posted in Hacking Etico, Pentest, RADIO, RF, Security, Technology
Tagged attack vector, Computer Network Operations (CNO), Cyber Wars, CyberSecurity, Davos, Information Warfare
Leave a comment
Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum (Part 2)
Disclaimer: Everything described here is pure imagination and any resemblance to reality is coincidental. The author is not responsible for the consequences of any action taken based on the information provided in the article. Please read Part 1 (Davos 2024) … Continue reading
Posted in Books, Business, Economics, Hacking Etico, Pentest, Privacy, RADIO, Uncategorized
Tagged Computer Network Operations (CNO), CyberSecurity, Information Warfare, Intelligence, RF
Leave a comment
The Evolution of Software Development: From Manual Coding to AI-Generated Code and the Security Implications
The journey of software development is a fascinating tale of innovation, creativity, and technological advancement. I started learning how to code in the late 80s as a kid with languages such as Pascal and Clipper, later came C and assembly. … Continue reading
Posted in Uncategorized
Leave a comment
Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum
Disclaimer: Everything described here is pure imagination and any resemblance to reality is coincidental. The author is not responsible for the consequences of any action taken based on the information provided in the article. The Davos Forum organized by the … Continue reading
Posted in Hacking Etico, RF, Security
Tagged attack vector, Computer Network Operations (CNO), Information Warfare, Intelligence
Leave a comment
Modern Wardriving
Let’s start by defining the word Wardriving: it is the search for WIFI wireless networks from a vehicle equipped with a computer. This would be the classic definition. I define modern wardriving as the search for WIFI networks, Bluetooth devices … Continue reading
Posted in Hacking Etico, RADIO, RF, Security, Technology, Wireless
Tagged Bluetooth, GSM, Penetration Testing, RF, Wardriving, WIFI, wireless
1 Comment
Fun in a Wild West shooting range with the Flipper Zero
For years I always thought about hacking the classic shooting range set in the Wild West powered by infrared shotguns. We can find these shooting ranges in amusement parks and fairs. Well, that moment has come and using the Flipper … Continue reading
Posted in Uncategorized
Leave a comment


