Author Archives: Simon Roses

The Ten Top Computer Science Papers You Must Read

Alan Turing (1937) On Computable Numbers, with an Application to the Entscheidungsproblem Vannevar Bush (1945) As We May Think Claude Elwood Shannon (1948) A Mathematical Theory of Communication Alan Turing (1950) COMPUTING MACHINERY AND INTELLIGENCE THOMAS J. McCABE (1976) A … Continue reading

Posted in Books, Business, Security, Technology | Tagged , , , , | Leave a comment

Hacker Entertainment for COVID-19 Times

We are facing an extraordinary and very serious situation, so it is necessary for the population to stay at home. Fortunately we live in the information age and many of us hackers are used to being locked up at home … Continue reading

Posted in Pentest, Security, Technology, Uncategorized | Tagged , , , , , | Leave a comment

October, European Cyber Security Month 2018: Success or Failure?

Last October was the European Cyber Security Month 2018, an campaign aiming at increasing cyber security awareness across EU citizens promoted by ENISA (European Union Agency for Network and Information Security), each October for the last 5 years. Kudos ENISA. … Continue reading

Posted in Privacy, Security, Technology, Uncategorized | Tagged , , , | Leave a comment

Book Review: PoC||GTFO

Yes, I’m back to blogging and doing a book review. I guess better late than never 🙂 This time I’m reviewing the holy hacker book: International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO, ISBN-13: 978-1-59327-880-9). The book sums … Continue reading

Posted in Books, Pentest, Privacy, Security, Technology | Tagged , , , , , | 2 Comments

Mirai DDoS Botnet: Source Code & Binary Analysis

Mirai is a DDoS botnet that has gained a lot of media attraction lately due to high impact attacks such as on journalist Brian Krebs and also for one of the biggest DDoS attacks on Internet against ISP Dyn, cutting … Continue reading

Posted in Privacy, Security, Technology | Tagged , , , , , , | 4 Comments

Fristileaks 1.3 CTF Writeup

This vulnerable VM is a fun and simple CTF that can be downloaded from the awesome portal VulnHub. Note: For vmware you may need to set the MAC address to 08:00:27:A5:A6:76 to get it working. I did, see Fig 1. … Continue reading

Posted in Pentest, Security, Technology | Tagged , , , , , | Leave a comment

Equation APT analysis using Security Data Science platform: BinSecSweeper

As many readers already know, at VULNEX we have been working on our BinSecSweeper project whose development began in 2013 thanks to an award by US DARPA within its pilot program Cyber Fast Track (CFT) and we were the only … Continue reading

Posted in Privacy, Security, Technology | Tagged , , , , , , , | Leave a comment

A Security Breach Can Hurt You, More Than You Think!

Week after week we read about security breaches in top websites around the world, where millions of user’s data are exposed and the company not even reply with an apology. Until now nobody in management (your typical C-level) assumed any … Continue reading

Posted in Security, Technology | Tagged , , , | Leave a comment

Race to 0day in Nation State Operating Systems

Operating System change is coming… We all know that Windows still dominates the desktop arena with Linux and MacOS trying to catch up and that Android dominates the mobile space with iOS and Windows Phone trying to catch up as … Continue reading

Posted in Privacy, Security, Technology | Tagged , , , , | Leave a comment

Cyber Intelligence Universe

In recent years all “cyber” is fashionable, and intelligence applied to the cyber world could not be less! The concept of intelligence has an offensive meaning due to the use by intelligence and military agencies, but now too many security … Continue reading

Posted in Pentest, Security, Technology, Threat Modeling | Tagged , , , , | Leave a comment