Blackhat Europe 2012, MundoHackerTV and More
[Español] Llevaba demasiadas semanas sin escribir un post y no puede ser La verdad es que estoy bastante ocupado con VULNEX (startup especializada en ciberseguridad) pero he sacado un poco de tiempo...
View ArticleBack to Black Hat Europe and my talk on Anti-Theft
Last Thursday 14 and Friday 15 March the Conference Black Hat Europe was held in the great city of Amsterdam, a mandatory event for cyber security experts. For second year running I presented on...
View ArticleA Security Breach Can Hurt You, More Than You Think!
Week after week we read about security breaches in top websites around the world, where millions of user’s data are exposed and the company not even reply with an apology. Until now nobody in...
View ArticleEquation APT analysis using Security Data Science platform: BinSecSweeper
As many readers already know, at VULNEX we have been working on our BinSecSweeper project whose development began in 2013 thanks to an award by US DARPA within its pilot program Cyber Fast Track (CFT)...
View ArticleFristileaks 1.3 CTF Writeup
This vulnerable VM is a fun and simple CTF that can be downloaded from the awesome portal VulnHub. Note: For vmware you may need to set the MAC address to 08:00:27:A5:A6:76 to get it working. I did,...
View ArticleBlackhat Europe 2012, MundoHackerTV and More
[Español] Llevaba demasiadas semanas sin escribir un post y no puede ser 🙂 La verdad es que estoy bastante ocupado con VULNEX (startup especializada en ciberseguridad) pero he sacado un poco de tiempo...
View ArticleBack to Black Hat Europe and my talk on Anti-Theft
Last Thursday 14 and Friday 15 March the Conference Black Hat Europe was held in the great city of Amsterdam, a mandatory event for cyber security experts. For second year running I presented on...
View ArticleA Security Breach Can Hurt You, More Than You Think!
Week after week we read about security breaches in top websites around the world, where millions of user’s data are exposed and the company not even reply with an apology. Until now nobody in...
View ArticleEquation APT analysis using Security Data Science platform: BinSecSweeper
As many readers already know, at VULNEX we have been working on our BinSecSweeper project whose development began in 2013 thanks to an award by US DARPA within its pilot program Cyber Fast Track (CFT)...
View ArticleFristileaks 1.3 CTF Writeup
This vulnerable VM is a fun and simple CTF that can be downloaded from the awesome portal VulnHub. Note: For vmware you may need to set the MAC address to 08:00:27:A5:A6:76 to get it working. I did,...
View ArticleOctober, European Cyber Security Month 2018: Success or Failure?
Last October was the European Cyber Security Month 2018, an campaign aiming at increasing cyber security awareness across EU citizens promoted by ENISA (European Union Agency for Network and...
View ArticleThe Ten Top Computer Science Papers You Must Read
Alan Turing (1937) On Computable Numbers, with an Application to the Entscheidungsproblem Vannevar Bush (1945) As We May Think Claude Elwood Shannon (1948) A Mathematical Theory of Communication Alan...
View ArticleCool podcasts on cyber security, red team, and startups (1)
Here you will find some of the cool podcasts that I have been listening lately on topics like cybersecurity, red team, hacking, artificial intelligence (AI), and startups. Some in English and other in...
View ArticleInformation Warfare Strategies (SRF-IWS): Unveiling the Risks: Paris Protests...
Introduction The world has witnessed countless protests throughout history, as people express their grievances and demand change. Paris, known for its passionate demonstrations, has experienced its...
View Article