Building the IoTrain
While developing the Matter workshop for DEF CON, I wondered what fun IoT project I could create that looks catchy, works well with DEF CON visitors,…
Ethical hacker and IT security researcher with more than 15 years of experience. Apart from an MSc Degree, ten technical certs, including OSCE or CISSP. Former speaker at DEFCON, SAS, AusCERT, Shakacon, and many more.
While developing the Matter workshop for DEF CON, I wondered what fun IoT project I could create that looks catchy, works well with DEF CON visitors,…
I don’t know what I did in the past, but boy do attackers love to send me phishing messages. This time, the story started with the…
Cheap Android set-top boxes are being sold by criminals, which either pre-infect devices with malware or have malicious code delivered via an update. Set-top boxes are…
If you are in a situation where you need to buy a baby monitor (camera), you probably want to choose something secure, right? For most of…
February 7th, 2024, was the day when many news portals ran a story about 3 million smart toothbrushes participating in a distributed denial of service attack…
On 2021 September 5, I bought a new domain, zh4ck.eth. This domain is interesting because I used magic Internet money (a.k.a cryptocurrency) to pay for it,…
Introduction At this year’s Hacktivity conference we organized the SpeedHacking CTF competition. Now it’s time to tell you how the idea came together, what we did…
If you like CTF games, you will have the opportunity to try your skills at the Hacktivity conference! On Friday, find the QR code at the…
It is already late evening, and I just posted my old MacBook Pro for sale on Facebook Marketplace. I have sold many items this year, so…
We have recently published a detailed article about a “pig butchering” cryptocurrency-related scam. This is a follow-up on what happens to victims after they lose significant…
I know, I know, we are a bit late with this one, but better late than never 🙂 What everyone writing these predictions loves is that…
Warning: Don’t try this at home! Following these steps might involve you losing money. You have been warned! UPDATE: After sharing this story I got contacted…
At CUJO AI, we like to play with new technologies. And even though we have provided machine learning-based 0-day phishing protection since 2019, we do not…
And the winners of the MLSEC 2022 challenge are Facial Recognition First place – Alex Meinke Facial Recognition Second place – Zhe Zhao Phishing First Place…
If you’re not interested in the long introduction and just want to go straight to my write up of the attempts, start with “The First Try”…