CyberSecPolitics
Saturday, June 15, 2019
Bytes, Bombs and Spies - A guest review
›
After reading his book review on ‘Bytes, Bombs, and Spies’ Dave was kind enough to offer me a guest blog post to share my own thoughts. Fi...
Friday, June 14, 2019
What does "On Team" mean?
›
https://techcrunch.com/2019/06/13/black-hat-keynote-will-hurd/ One issue with the VEP is that hackers, those who form the core of your...
Tuesday, June 11, 2019
Book Review FALL; or DODGE IN HELL (SPOILERS)
›
https://www.amazon.com/Fall-Dodge-Hell-Neal-Stephenson/dp/006245871X Neal Stephenson and William Gibson and Daniel Keys Moran all trea...
Monday, May 27, 2019
Baltimore is not EternalBlue
›
Recently a misleading and terribly researched article (via Nicole Perlroth and Scott Shane ) came out in the NYT which essentially blam...
1 comment:
Monday, May 13, 2019
Hope is not a NOBUS strategy
›
So typically the first thing I do when I get a new implant to look at is see if the authors implemented public key encryption into it, or if...
Wednesday, May 8, 2019
OPSEC is a thing
›
Note: One of the many things you will NOT learn in this article is HOW the Chinese did anything I want to point out that Nicole Perl...
Tuesday, March 12, 2019
The Lost Art of Shellcode Encoder/Decoders
›
Introduction Networked intrusion detection systems used to be a thing. But more importantly, stack overflows used to be a thing. And ...
3 comments:
‹
›
Home
View web version