Even FireEye got hacked – Are you safe from hackers?

Even a large professional security company like FireEye got hacked the other day by what was claimed to be a nation-state (fire eye breach statement). This hack is a clear example that anyone is vulnerable, and requires adequate hack detection and hack prevention. FireEye had their security detection well in place, which resulted in them […]

Bug hunting, for fun and profit. My slightly but not so technical how to guide for anyone.

This article reflects not only how I like to do bug bounty programs, but also how I approach most of my normal penetration tests, red teams or web security assessments. It works well for me and many clients I’ve served have been helped by it. It might very well be not your exact style. I try to show here the […]

Practical advice on time management and where to focus on when you want to kick ass at any course and study!

One of the topics that came along during my call for subjects was that of preparations for courses, especially the time management part when having a full time job or being a student.  I understand where this comes from, I’ve had similar doubts in the past myself. Many courses seem massively large and look like an unclimbable mountain or […]

Radical Red Teaming, adding value to your company’s resilience

On a day to day basis I get asked why companies should care more about red teams. Often within the same sentence it is stated that a standard penetration test is sufficient and that other forms of offensive security assessments aren’t needed “because everything is covered already” or “else it might break” One thing I’ve […]

Security Vulnerabilities in a Mainframe Emulator from Micro Focus

In March 2017 my colleague Meiyer Goren and myself have been requested through our employer Comsec by one of our clients to do an assessment on their new mainframe setup. They had decided a year earlier to replace their regular mainframe setup by a mainframe emulator, the Micro Focus Enterprise Server suite. This product is […]

Cyber Security & Information Risk Management, the devil’s dilemma

Why People Matter Most? Security is not about Technology. I’m a big advocate of this statement and pose it anywhere I possible can. Why? Because nowadays the security vendor landscape seems to be all about the holy grail and “nextgen 2.0” products.  What is missing is the core foundation of people making mistakes, all day, […]

Fighting QakBot.T – A Wormable Banking Trojan

Introduction to the Incident Recently we where notified by a large international company of an incident in one of its sites in the US. The incident resulted in the spread of the computer worm QakBot.T onto an estimate of 160 workstations and laptops inside one of the network sites of the client. The computer-worm created […]

Social Engineering; Why I think your business should care

I’m amazed every single day about the way people think about normal-life security inside companies. Big or small; everybody has weaknesses that go unnoticed until disaster strikes. Whether it’s an employee, a disgruntled employee or an external entity who gained access to your company; it doesn’t matter much. Any of them can cause your company to […]

How to get inside a company Data Center…

Today I arrived early for my meeting so I was able to sit at the lobby listening to conversations taking place between security-reception and the employees/guests of the company. After a couple of minutes a maintenance guy approached the reception and told them that he was checking all the fire extinguishers in the building and […]