Marta Nieto Gómez-Elegido «We are moving towards genderless professions», María Martínez It’s a cold morning in Madrid and María Martínez Martín, Head of the Threats Intelligence Operations team at Telefónica Tech, welcomes us at the Telefónica building. Wearing a blue blazer...
Marta Nieto Gómez-Elegido “To be a hacker in life is to be a passionate, talented person who manages to influence the transformation of society”, Carmen Alonso They say that passion for a profession is forged at an early age. Our parents are our first and most important role models. So, it is not surprising that...
Marta Nieto Gómez-Elegido Edge Computing, 3 case studies 2021 was a turning point for the arrival of Edge Computing in our lives. Newscasts, written press, social networks, chats among friends… This term did not escape from any...
Marta Nieto Gómez-Elegido Edge Computing and Virtual Reality, new classmates It’s been a little while since the new school year started. New subjects, new challenges and new classmates. Among them, one name is becoming increasingly heard: Edge Computing. Thanks to...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick HookMe, a tool for intercepting communications with API hooking HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...