Next week, Ackcent will be returning to Infosecurity Europe in London for the fourth consecutive year.
This post is the first of a series of posts that will provide a better understanding about the techniques used by adversaries to reach their tactical objectives.
In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main configurations.
During a recent engagement, our AppSec team faced an interesting instance of limited Server Side Template Injection in Freemarker.
Newest Addition to Leading Native AI Platform Provides Continuous User Authentication Across the Organization Using the Cylance Trust Score.
It is widely known how dangerous using unsanitized data in SQL queries can be.
RSA Conference 2019 is taking place this week at Moscone Center in San Francisco (USA). This year's leitmotiv is just one word: Better.
Get resources in your mailbox for free
Our AppSec team has faced the SQLCipher library during some recent security audits of mobile applications. According to their GitHub README:
We tend to think that cybersecurity is only about protecting ourselves from the bad guys, but many security incidents ara unintentional and respond to accidental causes.
Mobile phones have become an essential part of our lives. We use them both personally and professionally to access and store large amounts of data, some of which are very sensitive.
Any device that has software can get infected with malware. Malware is software designed to perform malicious actions.
Another edition of Ackcent's Cyberlunch took place recently in Madrid with the participation of Cylance , along with a number of CISOs and CIOs from companies operating in diverse business sectors.