About:

Simon Roses Femerling is a security researcher and entrepreneur with interests in technology and business, and enjoys exploring the world.

Website:

Specializations:

Interests:

Security Pen Testing Technology Business

Outgoing Links:

Subscribe to RSS:
AI agent skill poisoning represents a significant new threat in supply chain security, exploiting Markdown documentation to deliver malicious payloads and compromise sensitive data.
Professional Vibe Coding empowers developers to use AI for software creation while maintaining control over critical decisions like architecture and security.
Shadow AI and Shadow Vibe Coding pose significant security risks in corporate networks by enabling unregulated AI tools and applications that lack oversight and expose sensitive data.
The post details advanced security threats facing Davos 2026, highlighting the need for AI-driven defenses against autonomous attacks and deepfake technology.
OpenClaw revolutionized my cybersecurity consulting work by automating tasks and integrating AI, enhancing productivity while maintaining strict security protocols.
The article explores emerging attack vectors and evolving threats that could potentially be leveraged by nation-state actors at the Davos Forum. It discusses new attack vectors such as AI-enhanced phishing and deepfake scams, smar...
The text discusses the evolution of software development from manual coding to AI-generated code, highlighting the security implications at each stage. It explores the birth of software development, the composition era, and the AI...
The text discusses offensive operations at the Davos Forum, focusing on the preparations before and during the forum. It covers the selection of objectives, identification of RF devices, CCTV devices, development and purchase of e...

0Modern Wardriving

2023-12-22

The text discusses modern wardriving, which involves searching for WIFI networks, Bluetooth devices, and GSM towers from various types of vehicles or even on foot. The author has been analyzing wireless networks since the early 20...
The author discusses hacking a classic Wild West shooting range using the Flipper Zero, a security and pentesting device designed for ethical hackers and IT security professionals. They provide details on the infrared capabilities...
The text discusses the potential cybersecurity risks posed by protesters taking advantage of chaos during protests to install Red Team hardware in stores, compromising the cybersecurity of companies. It explores the implications o...
The article discusses the capabilities of Flipper Zero, a portable multi-tool for hackers, security professionals, and geeks. It focuses on the Infrared (IR) feature of Flipper Zero, demonstrating its ability to control electronic...
The author shares their experience taking the Offensive Security Wireless Professional (OSWP) practical exam, providing tips and recommendations for those interested in obtaining the certification.
The post discusses the combination of Numbers Station and Raspberry Pi, and how to create your own Numbers Station using a Raspberry Pi. It provides a brief history of Numbers Stations, mentions famous Numbers Stations, and explai...
The text lists the top ten computer science papers that the author recommends reading, along with a call for additional suggestions from readers.
The text provides hacker-themed ideas to train and have a good time during confinement, including computer programming, lockpicking, web security, and hacking challenges. It also includes a list of resources for online training, v...