Stuxnet: Zero victims

We collected Stuxnet files for two years. After analyzing more than 2,000 of these files, we were able to identify the organizations that were the first victims of the worm’s different variants in 2009 and 2010. Perhaps an analysis of their activity can explain why they became “patients zero” (the original, or zero, victims). Read Full Article

Securmatica XXV

The twenty-fifth edition of Securmática was held in Madrid (Spain) on April 22, 23 and 24, 2014. Although its content is not usually highly technical, it is a really interesting event for catching-up with the cybersecurity industry at an “institutional”… Read Full Article

SyScan 2014

In the first week of April 2014 we were at “The Symposium on Security for Asia Network” (SyScan), a “geeky” single-track conference located in Singapore. I liked the friendly atmosphere from the very first slides of the event (as is… Read Full Article

RootedCON V

It was five years ago when a group of computer security enthusiasts decided to gather together and organize a security conference mainly for a Spanish-speaking audience. Last week RootedCon celebrated its fifth birthday, gathering more than 1000 attendees. It is… Read Full Article

CODE BLUE in Tokyo

On February 17th (MON) – 18th (TUE), 2014 we were at an event in Tokyo called “CODE BLUE”, a new international information security conference originating from Japan. Even though this conference was being held for the first time, no less than… Read Full Article

NSAccess Control Lists

Last week, I attended the International Conference on Cyber Security at Fordham University in NYC. This event brought together participants from government, the private sector and academia. The closing session was a panel featuring the directors of the CIA, FBI and NSA… Read Full Article

South Korean ‘Whois Team’ attacks

Earlier today, reports of a number of cyberattacks against various South Korean targets hit the news. The attackers, going by the handle ?Whois Team¦ left a number of messages during the defacements: The code used for defacement, posted by an… Read Full Article