Network Security 15/February/2024 What is DoS? How to defend yourself? Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks represent a constant threat to global enterprises, with alarming numbers of incidents. In addition to the direct losses caused by the interruption of services, companies face a new form of attack: Ransom DDoS (RDDoS), where attackers demand payment to cease attacks
Cyber-Physical Systems 22/September/2023 Study of vulnerabilities in MIFARE Classic cards Understand how RFID technology allows remote communication through electronic tags. Discover the details of MIFARE Classic cards, their structure, encryption and potential vulnerabilities
Cloud & Platform Security 28/October/2021 Enumerating Services in AWS Accounts in an Anonymous and Unauthenticated Manner In recent research, we adjusted a enumeration technique used for years to map services on a AWS account to just its account id and with unauthenticated form
Application Security 14/October/2020 HTML to PDF converters, can I hack them? Our goal here was to investigate what kind of vulnerabilities can be inserted in a software through the use of libraries with the above mentioned functionality
Hardware/Embedded 02/September/2020 The danger of using the Wifi module ESP8266 to create a backdoor We will detail the necessary steps to perform the firmware upload correctly
Intelligence 18/June/2020 Tactics, techniques, and pointers on recent major Double Extortion threats An overview of the actions of the groups operating the Maze, Snake, RagnarLocker, Clop, REvil (Sodinokibi), Netwalker (Mailto), DoppelPaymer, and Nefilim ransomwares
Intelligence 08/May/2020 Double Extortion: Data leak combined with ransomware have increased in recent weeks Criminals use various techniques to extract sensitive data and sabotage the environment, requiring payment to prevent leaks
Web Application Security 10/February/2020 Once upon a time an account enumeration Identifying valid users in a variety of conditions and ways to protect your systems from this threat
Uncategorized 14/March/2017 Steganography in Malvertising campaigns: attacks continue to improve These attacks have been active at least since 2014 and contain steganography techniques in their execution
Network Security 15/February/2024 What is DoS? How to defend yourself? Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks represent a constant threat to global enterprises, with alarming numbers of incidents. In addition to the direct losses caused by the interruption of services, companies face a new form of attack: Ransom DDoS (RDDoS), where attackers demand payment to cease attacks
Cyber-Physical Systems 22/September/2023 Study of vulnerabilities in MIFARE Classic cards Understand how RFID technology allows remote communication through electronic tags. Discover the details of MIFARE Classic cards, their structure, encryption and potential vulnerabilities
Cloud & Platform Security 28/October/2021 Enumerating Services in AWS Accounts in an Anonymous and Unauthenticated Manner In recent research, we adjusted a enumeration technique used for years to map services on a AWS account to just its account id and with unauthenticated form
Application Security 14/October/2020 HTML to PDF converters, can I hack them? Our goal here was to investigate what kind of vulnerabilities can be inserted in a software through the use of libraries with the above mentioned functionality
Hardware/Embedded 02/September/2020 The danger of using the Wifi module ESP8266 to create a backdoor We will detail the necessary steps to perform the firmware upload correctly
Intelligence 18/June/2020 Tactics, techniques, and pointers on recent major Double Extortion threats An overview of the actions of the groups operating the Maze, Snake, RagnarLocker, Clop, REvil (Sodinokibi), Netwalker (Mailto), DoppelPaymer, and Nefilim ransomwares
Intelligence 08/May/2020 Double Extortion: Data leak combined with ransomware have increased in recent weeks Criminals use various techniques to extract sensitive data and sabotage the environment, requiring payment to prevent leaks
Web Application Security 10/February/2020 Once upon a time an account enumeration Identifying valid users in a variety of conditions and ways to protect your systems from this threat
Uncategorized 14/March/2017 Steganography in Malvertising campaigns: attacks continue to improve These attacks have been active at least since 2014 and contain steganography techniques in their execution