-
Archives
- August 2024
- January 2024
- December 2023
- September 2023
- July 2023
- March 2023
- August 2022
- January 2022
- October 2021
- October 2020
- May 2020
- March 2020
- November 2018
- September 2017
- October 2016
- December 2015
- September 2015
- January 2015
- November 2014
- July 2014
- April 2014
- March 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- November 2012
- October 2012
- July 2012
- June 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
-
Meta
Tag Archives: CyberSecurity
Information Warfare Strategies (SRF-IWS): Unveiling the Risks: Paris Protests and the potential to compromise the cybersecurity of companies while looting their stores
Introduction The world has witnessed countless protests throughout history, as people express their grievances and demand change. Paris, known for its passionate demonstrations, has experienced its fair share of protests in recent times. Other places such as Barcelona (September 2022) … Continue reading
Posted in Economics, Pentest, Security, Technology
Tagged attack vector, CyberSecurity, Information Warfare, red team
Leave a comment
Cool podcasts on cyber security, red team, and startups (1)
Here you will find some of the cool podcasts that I have been listening lately on topics like cybersecurity, red team, hacking, artificial intelligence (AI), and startups. Some in English and other in Spanish 🙂 You can listen to them … Continue reading
Posted in Podcast, Security, Technology
Tagged CyberSecurity, Hacking, Penetration Testing, Podcast, red team, startups
Leave a comment
The Ten Top Computer Science Papers You Must Read
Alan Turing (1937) On Computable Numbers, with an Application to the Entscheidungsproblem Vannevar Bush (1945) As We May Think Claude Elwood Shannon (1948) A Mathematical Theory of Communication Alan Turing (1950) COMPUTING MACHINERY AND INTELLIGENCE THOMAS J. McCABE (1976) A … Continue reading
Posted in Books, Business, Security, Technology
Tagged Book, Computer Science, CyberSecurity, Information Security, Software Security
Leave a comment
October, European Cyber Security Month 2018: Success or Failure?
Last October was the European Cyber Security Month 2018, an campaign aiming at increasing cyber security awareness across EU citizens promoted by ENISA (European Union Agency for Network and Information Security), each October for the last 5 years. Kudos ENISA. … Continue reading
Posted in Privacy, Security, Technology, Uncategorized
Tagged Breach, CyberSecurity, Information Security, Leak
Leave a comment
Fristileaks 1.3 CTF Writeup
This vulnerable VM is a fun and simple CTF that can be downloaded from the awesome portal VulnHub. Note: For vmware you may need to set the MAC address to 08:00:27:A5:A6:76 to get it working. I did, see Fig 1. … Continue reading
Posted in Pentest, Security, Technology
Tagged CTF, CyberSecurity, hacker, Penetration Testing, Python, recon
Leave a comment
Equation APT analysis using Security Data Science platform: BinSecSweeper
As many readers already know, at VULNEX we have been working on our BinSecSweeper project whose development began in 2013 thanks to an award by US DARPA within its pilot program Cyber Fast Track (CFT) and we were the only … Continue reading
Posted in Privacy, Security, Technology
Tagged Application Security, APT, BigData, BinSecSweeper, CyberSecurity, Data Science, Software Security, VULNEX
Leave a comment
A Security Breach Can Hurt You, More Than You Think!
Week after week we read about security breaches in top websites around the world, where millions of user’s data are exposed and the company not even reply with an apology. Until now nobody in management (your typical C-level) assumed any … Continue reading
Posted in Security, Technology
Tagged attack vector, Breach, CyberSecurity, Information Security
Leave a comment
Back to Black Hat Europe and my talk on Anti-Theft
Last Thursday 14 and Friday 15 March the Conference Black Hat Europe was held in the great city of Amsterdam, a mandatory event for cyber security experts. For second year running I presented on R&D outlining the security posture of … Continue reading
Posted in Conference, Pentest, Security, Technology
Tagged Android, Anti-Theft, Application Security, Conference, CyberSecurity, Iphone, Penetration Testing, Software Security, VULNEX, Windows
Leave a comment
Blackhat Europe 2012, MundoHackerTV and More
[Español] Llevaba demasiadas semanas sin escribir un post y no puede ser 🙂 La verdad es que estoy bastante ocupado con VULNEX (startup especializada en ciberseguridad) pero he sacado un poco de tiempo para contaros las novedades. [English] Too many … Continue reading
Posted in Conference, Pentest, Security, Technology
Tagged Android, Application Security, Apps, Conference, CyberSecurity, Information Security, Iphone, Smartphone, Software Security, VULNEX
Leave a comment