-
Archives
- August 2024
- January 2024
- December 2023
- September 2023
- July 2023
- March 2023
- August 2022
- January 2022
- October 2021
- October 2020
- May 2020
- March 2020
- November 2018
- September 2017
- October 2016
- December 2015
- September 2015
- January 2015
- November 2014
- July 2014
- April 2014
- March 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- November 2012
- October 2012
- July 2012
- June 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
-
Meta
Tag Archives: Information Warfare
Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum
Disclaimer: Everything described here is pure imagination and any resemblance to reality is coincidental. The author is not responsible for the consequences of any action taken based on the information provided in the article. The Davos Forum organized by the … Continue reading
Posted in Hacking Etico, RF, Security
Tagged attack vector, Computer Network Operations (CNO), Information Warfare, Intelligence
Leave a comment
Information Warfare Strategies (SRF-IWS): Unveiling the Risks: Paris Protests and the potential to compromise the cybersecurity of companies while looting their stores
Introduction The world has witnessed countless protests throughout history, as people express their grievances and demand change. Paris, known for its passionate demonstrations, has experienced its fair share of protests in recent times. Other places such as Barcelona (September 2022) … Continue reading
Posted in Economics, Pentest, Security, Technology
Tagged attack vector, CyberSecurity, Information Warfare, red team
Leave a comment
What’s the point of reporting 0day?
In the last weeks the news related to PRISM has not stopped since leaked by Edward Snowden, who worked for Booz Allen Hamilton, a defense contractor for the NSA. One interesting outcome of these leaks is the NSA access to … Continue reading
A tale of Government Trojans
Sorry, only in Spanish 🙂 — Simon Roses Femerling
Posted in Pentest, Privacy, Security, Technology
Tagged APT, attack vector, Computer Network Operations (CNO), hacker, Information Warfare, Intelligence, malware, Penetration Testing, Rootkits, virus
Leave a comment
Infiltrate 2012 Report
[Español] El pasado 12 y 13 de enero tuvo lugar la segunda edición del congreso ofensivo Infiltrate organizada por ImmunitySec, en cuya primera edición ya estuvimos. A pesar que no todas las charlas fueron tan espectaculares como el año pasado … Continue reading
Cyber Warriors Factories
[Español] Hoy en dÃa muchas naciones conscientes de las amenazas en Internet están creando ciber guerreros para poder combatir en este nuevo frente. Aunque la información es escasa algunas de estas naciones han hecho público parte de su plan de … Continue reading
Posted in Hacking, Pentest, Security
Tagged Cyber Warfare, Cyber Wars, Information Security, Information Warfare, Intelligence, Penetration Testing
Leave a comment
Book Review Week: Rootkits: Subverting the Windows Kernel
[Español] El arte de los rootkits es fascinante y este libro nos adentra en este arte de forma amena a lo largo de sus diez capÃtulos con diferentes ejemplos para crear poderosos rootkits en Windows. Rootkits: Subverting the Windows Kernel … Continue reading
Posted in Books, Hacking, Pentest, Security, Technology
Tagged Book, Cyber Wars, Information Security, Information Warfare, malware, Penetration Testing, Rootkits, Software Security
Leave a comment
Information Warfare Strategies (SRF-IWS): Tax Haven Attacks
Desde esta nueva sección del blog, Information Warfare Strategies (SRF-IWS), presentaremos escenarios hipotéticos con relación a un tema muy de moda como es la ciberguerra. Analizaremos el porqué, el cómo y el impacto de realizar ataques a los sistemas informáticos … Continue reading