Start now

Trust in security with us

Cybersecurity is complex but it doesn’t have to be

Filter by

Execution – Powershell (T1086)

Execution – Powershell (T1086)

Powershell is a commandline interface (CLI) with command and scripting capabilities. Its main targets are System Administrators to automate task and control it.

The next generation of everything at Infosecurity

The next generation of everything at Infosecurity

Last week saw another edition of Europe’s largest cybersecurity event Infosecurity Europe , which Ackcent once again attended with a group of clients, together with some 20.000 professionals working in the sector.

Ackcent above and beyond in Spain with Stuart McClure, President and Founder at Cylance

Ackcent above and beyond in Spain with Stuart McClure, President and Founder at Cylance

Past May 30th, ISMS Forum , Spanish Association for the Promotion of Information Security, celebrated the 21st edition of the International Information Security Conference Cyber Risk Appetite in the new Digital Revolution

We are visiting Infosecurity Europe again this year!

We are visiting Infosecurity Europe again this year!

Next week, Ackcent will be returning to Infosecurity Europe in London for the fourth consecutive year.

Initial Access – Drive-by Compromise (T1189)

Initial Access – Drive-by Compromise (T1189)

This post is the first of a series of posts that will provide a better understanding about the techniques used by adversaries to reach their tactical objectives.

Basics- Linux Events Logging

Basics- Linux Events Logging

In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main configurations.

In-depth Freemarker Template Injection

In-depth Freemarker Template Injection

During a recent engagement, our AppSec team faced an interesting instance of limited Server Side Template Injection in Freemarker.

First proactive behavioral analytics solution CylancePERSONA

First proactive behavioral analytics solution CylancePERSONA

Newest Addition to Leading Native AI Platform Provides Continuous User Authentication Across the Organization Using the Cylance Trust Score.

An unusual case of Client SQL Injection

An unusual case of Client SQL Injection

It is widely known how dangerous using unsanitized data in SQL queries can be.

Ackcent attends the International RSA Conference once again

Ackcent attends the International RSA Conference once again

RSA Conference 2019 is taking place this week at Moscone Center in San Francisco (USA). This year’s leitmotiv is just one word: Better.

Recovering SQLCipher encrypted data with Frida

Recovering SQLCipher encrypted data with Frida

Our AppSec team has faced the SQLCipher library during some recent security audits of mobile applications. According to their GitHub README:

Let’s conclude Cybersecurity Awareness Month with some bonus tips!

Let’s conclude Cybersecurity Awareness Month with some bonus tips!

We tend to think that cybersecurity is only about protecting ourselves from the bad guys, but many security incidents ara unintentional and respond to accidental causes.