Past May 30th, ISMS Forum , Spanish Association for the Promotion of Information Security, celebrated the 21st edition of the International Information Security Conference Cyber Risk Appetite in the new Digital Revolution
This post is the first of a series of posts that will provide a better understanding about the techniques used by adversaries to reach their tactical objectives.
In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main configurations.
During a recent engagement, our AppSec team faced an interesting instance of limited Server Side Template Injection in Freemarker.
Newest Addition to Leading Native AI Platform Provides Continuous User Authentication Across the Organization Using the Cylance Trust Score.
Our AppSec team has faced the SQLCipher library during some recent security audits of mobile applications. According to their GitHub README:
Get resources in your mailbox for free
Recently, a new zero-day vulnerability was made public following a Tweet from @SandboxEscaper, who claimed to be frustrated with Microsoft and their bug submission process.
Etienne Stalmans (@_staaldraad) recently discovered a Remote Code Execution vulnerability in the version-control software Git (CVE-2018-11235).
Once upon a time there was a company who had three computers within its infrastructure. The first computer was placed on the DMZ and was configured by default by the IT Manager.
GDPR is meant to be complied with by each data controller and data processor within the European Union (EU)
This November we will once again witness the unstoppable digital transformation that cities were undergone at Smart City Expo Empower Cities, Empower People
Mathy Vanhoefm published a set of attacks against the Wi-Fi security protocol WPA2 with the name Key Reinstallation Attacks, or KRACKS.