Exploit Development 04/April/2023 Attacking JS engines: Fundamentals for understanding memory corruption crashes It will be possible to better understand the Javascript structures in memory while executing code in browsers or in any other program that makes use of the most famous JS interpreters, such as Firefox, Google Chrome, Internet Explorer and Safari
Corporate Security 01/February/2023 Cloud Security to Reduce the Impact of Shadow-IT It is estimated that 97% of cloud applications are not being managed, making the visibility of these applications difficult for security teams
Software Security 09/December/2022 A Study on C Integers From January up until August 2022, MITRE has already registered 96 CVEs (common vulnerabilities and exposures) involving integers. Therefore, this is a subject that requires attention
Corporate Security 24/November/2022 The dangers of Shadow It – and CASB’s role in protecting the environment There was a time when people considered that data would always be safe behind applications, which were considered to be heavily protected
Exploit Development 04/April/2023 Attacking JS engines: Fundamentals for understanding memory corruption crashes It will be possible to better understand the Javascript structures in memory while executing code in browsers or in any other program that makes use of the most famous JS interpreters, such as Firefox, Google Chrome, Internet Explorer and Safari
Corporate Security 01/February/2023 Cloud Security to Reduce the Impact of Shadow-IT It is estimated that 97% of cloud applications are not being managed, making the visibility of these applications difficult for security teams
Software Security 09/December/2022 A Study on C Integers From January up until August 2022, MITRE has already registered 96 CVEs (common vulnerabilities and exposures) involving integers. Therefore, this is a subject that requires attention
Corporate Security 24/November/2022 The dangers of Shadow It – and CASB’s role in protecting the environment There was a time when people considered that data would always be safe behind applications, which were considered to be heavily protected