Zoltan Balazs

Head of Vulnerability Research Lab

Ethical hacker and IT security researcher with more than 15 years of experience. Apart from an MSc Degree, ten technical certs, including OSCE or CISSP. Former speaker at DEFCON, SAS, AusCERT, Shakacon, and many more.

All posts by Zoltan Balazs

  • This Black Friday, Choose Smart Devices with Cybersecurity in Mind

    As we’re looking at another Black Friday, we can expect consumers to expose themselves to more cybersecurity threats thanks to their purchases. This article will look…

  • Mobile Security: iOS vs Android – Which Is Right for Your Threat Model?

    Which mobile operating system (OS) is more secure: iOS or Android? This straightforward question does not have a simple answer. As with most topics in IT…

  • Detecting Rogue Devices with Artificial Intelligence

    Rogue devices are malicious machines placed inside networks to steal data or otherwise spy on network users. The owners of these devices might range from your…

  • Restricted Environment IoT Hacking: All You Need Is a Remote Shell

    I recently decided to analyze some binaries on an IoT camera I had Telnet access to. What should have been as easy as copying files from…

  • Machine Learning Security Evasion Competition 2020 Results and Behind the Scenes

    Back in 2019, Hyrum Anderson and I organized the Machine Learning Security Evasion Competition (MLSEC), where participants had to modify malware samples to remain functional and…

  • FIRST SecLounge CTF 2020 Solutions

    The FIRST 2020 Virtual Challenge Competition was organized at the end of June as a virtual version of the annual CTF (Capture the Flag) held by…

  • CUJO AI Labs Won the FIRST 2020 Virtual Challenge Competition

    Last week, four of us from CUJO AI Labs spent three days solving complex challenges in network, cryptography, reverse engineering, programming, puzzle and other categories in…

  • CUJO AI Partners with Microsoft for the Machine Learning Security Evasion Competition 2020

    Last year, Dr. Hyrum Anderson, now the Principal Architect (Security Machine Learning) at Microsoft, and I designed a competition, and it was a huge success. It was launched at…

  • Protecting Home Offices: Full-tunnel VPN vs. Split-tunnel VPN

    The transition to work from home was a significant change in people’s lives and the ways businesses operate. Some people were provided company devices to work…