-
Archives
- August 2024
- January 2024
- December 2023
- September 2023
- July 2023
- March 2023
- August 2022
- January 2022
- October 2021
- October 2020
- May 2020
- March 2020
- November 2018
- September 2017
- October 2016
- December 2015
- September 2015
- January 2015
- November 2014
- July 2014
- April 2014
- March 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- November 2012
- October 2012
- July 2012
- June 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
-
Meta
Category Archives: Privacy
October, European Cyber Security Month 2018: Success or Failure?
Last October was the European Cyber Security Month 2018, an campaign aiming at increasing cyber security awareness across EU citizens promoted by ENISA (European Union Agency for Network and Information Security), each October for the last 5 years. Kudos ENISA. … Continue reading
Posted in Privacy, Security, Technology, Uncategorized
Tagged Breach, CyberSecurity, Information Security, Leak
Leave a comment
Book Review: PoC||GTFO
Yes, I’m back to blogging and doing a book review. I guess better late than never 🙂 This time I’m reviewing the holy hacker book: International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO, ISBN-13: 978-1-59327-880-9). The book sums … Continue reading
Posted in Books, Pentest, Privacy, Security, Technology
Tagged Book, exploit, Information Security, Penetration Testing, Poc||GTFO, Software Security
2 Comments
Mirai DDoS Botnet: Source Code & Binary Analysis
Mirai is a DDoS botnet that has gained a lot of media attraction lately due to high impact attacks such as on journalist Brian Krebs and also for one of the biggest DDoS attacks on Internet against ISP Dyn, cutting … Continue reading
Posted in Privacy, Security, Technology
Tagged attack vector, botnet, DDoS, IoT, Linux, malware, Mirai
4 Comments
Equation APT analysis using Security Data Science platform: BinSecSweeper
As many readers already know, at VULNEX we have been working on our BinSecSweeper project whose development began in 2013 thanks to an award by US DARPA within its pilot program Cyber Fast Track (CFT) and we were the only … Continue reading
Posted in Privacy, Security, Technology
Tagged Application Security, APT, BigData, BinSecSweeper, CyberSecurity, Data Science, Software Security, VULNEX
Leave a comment
Race to 0day in Nation State Operating Systems
Operating System change is coming… We all know that Windows still dominates the desktop arena with Linux and MacOS trying to catch up and that Android dominates the mobile space with iOS and Windows Phone trying to catch up as … Continue reading
Posted in Privacy, Security, Technology
Tagged attack vector, Computer Network Operations (CNO), exploit, Intelligence, Software Security
Leave a comment
VULNEX Award and RSA USA speaker experience!
February has been both very interesting and busy! On February 17th I had the pleasure of collecting the first award of VULNEX by Spanish security magazine Red Seguridad for IT Innovation for our collaboration with DARPA (Defense Advanced Research Projects … Continue reading
Posted in Conference, Privacy, Security, Technology
Tagged Application Security, BinSecSweeper, Conference, SDL, Software Security, VULNEX
Leave a comment
Enterprise Computer Security must CHANGE
Last week I had the pleasure of giving a talk entitled “Cyber Security: time for change” on my vision of corporate cyber security posture during an event organized by Page Personnel Spain (thanks for having me!), and I already advance … Continue reading
AppSec: Myths about Obfuscation and Reversing Python
Python is an easy and powerful programming language that allows us to write sophisticated programs: Dropbox and BitTorrent are excellent examples. It is common that Python programs are delivered in source code, but in some cases different techniques like obfuscation … Continue reading
Posted in Pentest, Privacy, Security, Technology
Tagged Application Security, attack vector, Penetration Testing, Python, Reverse Engineering, Software Security
15 Comments
A tale of Government Trojans
Sorry, only in Spanish 🙂 — Simon Roses Femerling
Posted in Pentest, Privacy, Security, Technology
Tagged APT, attack vector, Computer Network Operations (CNO), hacker, Information Warfare, Intelligence, malware, Penetration Testing, Rootkits, virus
Leave a comment
AppSec: Build Rooted Detection in your App
For various reasons many Apps need to detect if the phone has been “rooted” and in this article will see different techniques for this purpose. Since it is common to see this type of questions in development forums, I thought … Continue reading