Published inJust another infosec blog type of thingHacking (Back) and Influence OperationsThe new convergence of disinformation tactics and CNE in the Middle EastApr 19, 20193Apr 19, 20193
Published inJust another infosec blog type of thingFrance might be losing its first big information warForeign propagandists are getting a strong foothold in France, and the traditional media can’t fight itDec 6, 20188Dec 6, 20188
Published inJust another infosec blog type of thingHiding Through a Maze of IoT DevicesHow to create the perfect anonymizing botnet by abusing UPnP features — and without any infectionNov 29, 20181Nov 29, 20181
Published inJust another infosec blog type of thingA Look Into Signal’s Encrypted ProfilesCan this feature get abused for OSINT discovery?Aug 24, 20181Aug 24, 20181
Published inJust another infosec blog type of thingUncovering Foreign Trolls (Trying) To Influence French Elections on TwitterAn inside look at a cyber psychological operation against FranceJul 12, 20182Jul 12, 20182
Published inJust another infosec blog type of thingCurrent State of Hacking BackThe slides of the talk I gave at ESE last week.May 22, 2018May 22, 2018
Published inJust another infosec blog type of thingIntroducing the first ever shitpost-based RNGUsing Twitter as an entropy source: the Internet is a chaotic mess, which happens to be a good source of entropyJan 23, 20181Jan 23, 20181
Published inJust another infosec blog type of thingCatching phishing before they catch youPaypal phishing, paypal phishing everywhereNov 7, 20173Nov 7, 20173
Published inJust another infosec blog type of thingSecuring a Web Hidden ServiceQuick guide on how to preserve a .onion anonymityOct 24, 20171Oct 24, 20171
Published inJust another infosec blog type of thingLink previews in IM apps and privacyMost instant messaging applications are providing enriched link summaries (as shown next with Telegram link previews), including…Oct 20, 20172Oct 20, 20172