Start now

Advance

For technical nomads, this is your guide to everything in cybersecurity

Managed Network Detection & Response: The visibility your network needs

Managed Network Detection & Response: The visibility your network needs

Connectivity is the essence of today’s business environment. However, the technology that makes this possible also exposes us to a new set of risks.

Ransomware 101: How to Prevent, Detect, and Respond to a ransomware attack

Ransomware 101: How to Prevent, Detect, and Respond to a ransomware attack

As organizations digitalize, increased technological dependence requires them to embrace cybersecurity as a strategic pillar.

Stay secure while teleworking

Stay secure while teleworking

Working from home reduces the chance of spreading the virus, but it exposes us to other types of risks.

Testlink 1.9.20: Unrestricted file upload and SQL injection

Testlink 1.9.20: Unrestricted file upload and SQL injection

Testlink is an open source, web based test management and test execution system written in PHP (a scripting language also known as an Hypertext Preprocessor).

The rise of Emotet

The rise of Emotet

Emotet is a multipurpose malware which is mainly distributed through spam mails. It was first spotted in 2014 and was designed to steal bank account details.

4 steps to manage cybersecurity incidents

4 steps to manage cybersecurity incidents

We understand cybersecurity incidents as any event that can harm a system’s confidentiality, integrity or availability.

Execution – Powershell (T1086)

Execution – Powershell (T1086)

Powershell is a commandline interface (CLI) with command and scripting capabilities. Its main targets are System Administrators to automate task and control it.

Initial Access – Drive-by Compromise (T1189)

Initial Access – Drive-by Compromise (T1189)

This post is the first of a series of posts that will provide a better understanding about the techniques used by adversaries to reach their tactical objectives.

Basics- Linux Events Logging

Basics- Linux Events Logging

In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main configurations.

In-depth Freemarker Template Injection

In-depth Freemarker Template Injection

During a recent engagement, our AppSec team faced an interesting instance of limited Server Side Template Injection in Freemarker.

First proactive behavioral analytics solution CylancePERSONA

First proactive behavioral analytics solution CylancePERSONA

Newest Addition to Leading Native AI Platform Provides Continuous User Authentication Across the Organization Using the Cylance Trust Score.

An unusual case of Client SQL Injection

An unusual case of Client SQL Injection

It is widely known how dangerous using unsanitized data in SQL queries can be.