Powershell is a commandline interface (CLI) with command and scripting capabilities. Its main targets are System Administrators to automate task and control it.
Last week saw another edition of Europe's largest cybersecurity event Infosecurity Europe , which Ackcent once again attended with a group of clients, together with some 20.000 professionals working in the sector.
Past May 30th, ISMS Forum , Spanish Association for the Promotion of Information Security, celebrated the 21st edition of the International Information Security Conference Cyber Risk Appetite in the new Digital Revolution
This post is the first of a series of posts that will provide a better understanding about the techniques used by adversaries to reach their tactical objectives.
In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main configurations.
During a recent engagement, our AppSec team faced an interesting instance of limited Server Side Template Injection in Freemarker.
Get resources in your mailbox for free
Newest Addition to Leading Native AI Platform Provides Continuous User Authentication Across the Organization Using the Cylance Trust Score.
Our AppSec team has faced the SQLCipher library during some recent security audits of mobile applications. According to their GitHub README:
Recently, a new zero-day vulnerability was made public following a Tweet from @SandboxEscaper, who claimed to be frustrated with Microsoft and their bug submission process.
Etienne Stalmans (@_staaldraad) recently discovered a Remote Code Execution vulnerability in the version-control software Git (CVE-2018-11235).
Once upon a time there was a company who had three computers within its infrastructure. The first computer was placed on the DMZ and was configured by default by the IT Manager.
GDPR is meant to be complied with by each data controller and data processor within the European Union (EU)