Even FireEye got hacked – Are you safe from hackers?

Even a large professional security company like FireEye got hacked the other day by what was claimed to be a nation-state (fire eye breach statement). This hack is a clear example that anyone is vulnerable, and requires adequate hack detection and hack prevention. FireEye had their security detection well in place, which resulted in them […]

Is your webserver protected against hackers?

Hackers and cyber criminals are going after your online servers, 24 hours a day 7 days a week. They run automated scripts and tools to break into your website. They want to steal your customer data and try to bribe you with this data. You can stay ahead of the game and find out where […]

Bug hunting, for fun and profit. My slightly but not so technical how to guide for anyone.

This article reflects not only how I like to do bug bounty programs, but also how I approach most of my normal penetration tests, red teams or web security assessments. It works well for me and many clients I’ve served have been helped by it. It might very well be not your exact style. I try to show here the […]

Practical advice on time management and where to focus on when you want to kick ass at any course and study!

One of the topics that came along during my call for subjects was that of preparations for courses, especially the time management part when having a full time job or being a student.  I understand where this comes from, I’ve had similar doubts in the past myself. Many courses seem massively large and look like an unclimbable mountain or […]

Radical Red Teaming, adding value to your company’s resilience

On a day to day basis I get asked why companies should care more about red teams. Often within the same sentence it is stated that a standard penetration test is sufficient and that other forms of offensive security assessments aren’t needed “because everything is covered already” or “else it might break” One thing I’ve […]

Cyber Security & Information Risk Management, the devil’s dilemma

Why People Matter Most? Security is not about Technology. I’m a big advocate of this statement and pose it anywhere I possible can. Why? Because nowadays the security vendor landscape seems to be all about the holy grail and “nextgen 2.0” products.  What is missing is the core foundation of people making mistakes, all day, […]

Fighting QakBot.T – A Wormable Banking Trojan

Introduction to the Incident Recently we where notified by a large international company of an incident in one of its sites in the US. The incident resulted in the spread of the computer worm QakBot.T onto an estimate of 160 workstations and laptops inside one of the network sites of the client. The computer-worm created […]

Why a Hacker isn’t an Application Tester

This is a story that i have to tell; it’s impossible to ignore. I spend a couple of days of my time talking to one of the largest companies in the world… They have been looking for ethical hackers / security consultants or whatever you want to call it, so  I was introduced by a head hunter […]