CyberSecPolitics

Saturday, June 15, 2019

Bytes, Bombs and Spies - A guest review

›
After reading his book review on ‘Bytes, Bombs, and Spies’ Dave was kind enough to offer me a guest blog post to share my own thoughts. Fi...
Friday, June 14, 2019

What does "On Team" mean?

›
https://techcrunch.com/2019/06/13/black-hat-keynote-will-hurd/ One issue with the VEP is that hackers, those who form the core of your...
Tuesday, June 11, 2019

Book Review FALL; or DODGE IN HELL (SPOILERS)

›
https://www.amazon.com/Fall-Dodge-Hell-Neal-Stephenson/dp/006245871X Neal Stephenson and William Gibson and Daniel Keys Moran all trea...
Monday, May 27, 2019

Baltimore is not EternalBlue

›
Recently a misleading and terribly researched article  (via  Nicole Perlroth and Scott Shane ) came out in the NYT which essentially blam...
1 comment:
Monday, May 13, 2019

Hope is not a NOBUS strategy

›
So typically the first thing I do when I get a new implant to look at is see if the authors implemented public key encryption into it, or if...
Wednesday, May 8, 2019

OPSEC is a thing

›
Note: One of the many things you will NOT learn in this article is HOW the Chinese did anything I want to point out that  Nicole Perl...
Tuesday, March 12, 2019

The Lost Art of Shellcode Encoder/Decoders

›
Introduction Networked intrusion detection systems used to be a thing. But more importantly, stack overflows used to be a thing. And ...
3 comments:
‹
›
Home
View web version

Contributors

  • Chris Rohlf
  • Cyber Lunarium Commission
  • Dave Aitel
Powered by Blogger.