-
Jul 19, 2024
Recently Google has announced its intention to acquire Wiz, a prominent Israeli cybersecurity company, for a staggering $23 billion. This potential acquisition, if successful, would not only be Google’s largest to date but also the biggest ever in the cybersecurity… read more »
-
Jul 16, 2024
As a manager, my primary responsibility is to create an environment where my team can thrive. The views I’m about to share are purely my own, derived not from management textbooks or theories, but from my many years of hands-on… read more »
-
Jul 14, 2024
Cloudflare offers a good VPN solution called Cloudflare Warp: this article delves into the intricacies of Cloudflare Warp, its foundation in Wireguard technology, and explores how users can harness its power using standard Wireguard clients, providing a flexible approach to… read more »
-
Jul 9, 2024
Our digital lives are an integral part of our overall existence. From social media and online banking to cloud storage and smart home devices, we constantly interact with digital systems that process and store our personal information. While these technologies… read more »
-
Jul 8, 2024
Okay, let’s chat about something that’s been bugging me lately - and I bet it’s been on your mind too. You know how it feels like every time you turn around, some big tech company is trying to sneak a… read more »
-
Jul 3, 2024
In the shadowy world of digital espionage and cyber warfare, knowledge is power. But in an era where data flows like water through the vast networks of our interconnected world, how do we separate the signal from the noise? Enter… read more »
-
Jul 2, 2024
Disclaimer: This post is entirely satirical and should not be taken seriously under any circumstances. Any resemblance to actual management advice is purely coincidental and probably a sign that you need to reevaluate your leadership style. Reader discretion (and a… read more »
-
Jun 29, 2024
As I closed the final pages of “Death’s End,” the concluding volume of Cixin Liu’s mind-bending “The Three-Body Problem” trilogy, I found myself awash in a sea of emotions and ideas. This epic saga, which had taken me on a… read more »
-
Jun 26, 2024
In a dynamic and ever-evolving field like cybersecurity it’s easy to get engrossed in the technical complexities and overlook the human element. However, over the years I’ve come to realize that kindness is not just a soft skill; it’s an… read more »
-
Jun 18, 2024
The workplace can be a whirlwind of overflowing inboxes, demanding deadlines, and the expectation of constant availability. This relentless pressure can lead to burnout, resentment, and a longing for a better balance between your professional and personal life. The key… read more »
-
Jun 17, 2024
In the cybersecurity domain, incident responders act as the secret agents on the front lines of digital conflict. They engage in relentless mitigation efforts against cyber adversaries who exploit vulnerabilities that have the potential to cripple organisational infrastructure. While their… read more »
-
Jun 12, 2024
Performing forensic analysis on mobile devices necessitates a suite of specialized tools to ensure that data acquisition, analysis, and reporting are conducted in a forensically sound manner. In this post I’ll try to delve into the technical aspects of several… read more »
-
Jun 7, 2024
Open Source Intelligence (OSINT) investigations serve as indispensable tools for uncovering valuable insights and mitigating potential risks. However, the efficacy of these investigations hinges upon the precision and clarity of the questions posed. Ambiguous or poorly formulated inquiries can derail… read more »
-
May 27, 2024
Back in 2017, I shared a detailed post about the configuration of my Linux laptops on my blog (you can find it here). Since then, not only has my tech setup evolved, but my understanding and awareness of security and… read more »
-
May 25, 2024
Welcome, dear readers, to the frenetic world of modern work, where the rush is glorified and the only thing that matters is the end result. Ah, the culture of results! It’s as if we’re all running on a hamster wheel,… read more »
-
May 21, 2024
The world of work today if full of tasks, emails, meetings, and personal projects: In this situation, you may feel overwhelmed. But the Getting Things Done (GTD), a productivity system developed by David Allen, may helps you! GTD is not… read more »
-
May 20, 2024
For several years I have been using Jekyll as a platform for my site, and for publication I use a simple GitHub Action which converts an issue into a markdown file which is then processed by Jekyll (in one of… read more »
-
May 13, 2024
In the past I have often spoken (1,2) about Pegasus, the spyware originally produced and distributed by the Israeli company NSO, which has been used by various states to spy on activists, opponents and journalists. Now, with the upcoming European… read more »
-
Apr 26, 2024
The Wayback Machine is a digital archive of the internet, maintained by the Internet Archive. It allows you to view past versions of websites, which can be a valuable tool for OSINT investigations. For example, you can use the Wayback… read more »
-
Apr 3, 2024
Google recently disclosed two critical vulnerabilities (CVE-2024-29745 and CVE-2024-29748) affecting Pixel smartphones that are being actively exploited by forensic companies. These zero-day flaws, which haven’t yet been patched, could potentially allow unauthorised access to user data. The news comes more… read more »