Introduction This post is about the 2015, 2016 and 2022 cyberattacks on the energy supply infrastructure in Ukraine. In 2015, the attack of the GRU-sponsored Sandworm hacking team left hundreds of thousands of consumers without power for hours and raised alarms over the security of critical infrastructure worldwide. In 2016 and 2022, two incidents happened […]

Cyberwar and Cyberterrorism: What is the Difference?
Introduction The terms cyberwarfare and cyberterrorism are both used since the 1990s for describing adverse events in cyberspace. Even though the three-decade history of cyberwarfare and cyberterrorism, academic communities could not agree on a widely accepted definition of these terms and draw a clear line between the two types of cyber events.

Dark Web Marketplace Vendor Forensics
Researchers claim that the majority of the dark web exist to facilitate criminal activities, including drug trade, financial fraud, and illegal pornography. This article explores the different methods researchers have experimented with to help the identification and deanonimisation of the marketplace vendors of the dark web.

Upgrading the TL-WR902AC Travel Router with OpenWrt
I had an ageing TP-Link AC750 (TL-WR902AC) pocket router that I used to carry around on my travels before the pandemic. It is a handy travel mate allowing me to share the hotel Wi-Fi with my laptop, tablet and Chromecast devices. Sadly, the router has its limitations, but OpenWrt gave the AC750 a second life.

Automate Your Home Lab on the Oracle Cloud
Deploy your home lab and max out the free tier on the Oracle Cloud with the Terraform automation tool.

Taking Forensic Disk Images from the OVH Cloud
This article explains how a disk image can be taken from a virtual machine running on the public cloud. The acquired disk image can then be used with offline forensic tools like Autopsy and Encase.