Iskander Sanchez-Rola
Content Director/Researcher at DT
Expertise: Web Security, Privacy, Reverse Engineering, Malware
iskander-sanchez-rola.github.io

VPNs are not online invisibility cloaks

It is possible to access any content through a different network than the one we initially encountered. With a simple example, if we were initially in Spain, we could access a certain web page as if we were really in

All that glitters is not cryptomining, but almost

There is a new trend in the world of malware, called cryptojacking. In many wars they used enemy prisoners to mine minerals, this would be similar to this case but transferred to the 21st century. It consists in using the

A simple click can generate a logic explosion

Not all malware executes its malicious payload instantly as soon as they are downloaded and executed for the first time. Many times, these are kept in the shadow and are triggered only when a certain situation occurs (something like an

Everything started with the USB of that hacker

When someone finds out that your computer is infected, a question automatically pops up in your mind, how has this happened? First you think about the recent files downloaded / installed, then in the visited pages, and if no answer

Spear Phishing, adapting hooks to targets

Although many of you may have heard of phising, even been victims of some in the worst case, you are not so familiar with the next evolutionary step: spear phishing. Starting from the ground up, phishing is based on fooling

Capture The Flag, making hacking a game

It is possible to spend a fun weekend with friends hacking like there is no tomorrow, and of course I mean doing it completely legally. All this is thanks to the different CTFs that are organized throughout the year. These

PackerInspector

Our sandbox for packers

Categories