Contact Us Get an assesment

Trust in security with us

Filter by

Initial Access – Drive-by Compromise (T1189)

Initial Access – Drive-by Compromise (T1189)

This post is the first of a series of posts that will provide a better understanding about the techniques used by adversaries to reach their tactical objectives.

Basics- Linux Events Logging

Basics- Linux Events Logging

In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main configurations.

In-depth Freemarker Template Injection

In-depth Freemarker Template Injection

During a recent engagement, our AppSec team faced an interesting instance of limited Server Side Template Injection in Freemarker.

First proactive behavioral analytics solution CylancePERSONA

First proactive behavioral analytics solution CylancePERSONA

Newest Addition to Leading Native AI Platform Provides Continuous User Authentication Across the Organization Using the Cylance Trust Score.

An unusual case of Client SQL Injection

An unusual case of Client SQL Injection

It is widely known how dangerous using unsanitized data in SQL queries can be.

Ackcent attends the International RSA Conference once again

Ackcent attends the International RSA Conference once again

RSA Conference 2019 is taking place this week at Moscone Center in San Francisco (USA). This year's leitmotiv is just one word: Better.

Recovering SQLCipher encrypted data with Frida

Recovering SQLCipher encrypted data with Frida

Our AppSec team has faced the SQLCipher library during some recent security audits of mobile applications. According to their GitHub README:

Let’s conclude Cybersecurity Awareness Month with some bonus tips!

Let’s conclude Cybersecurity Awareness Month with some bonus tips!

We tend to think that cybersecurity is only about protecting ourselves from the bad guys, but many security incidents ara unintentional and respond to accidental causes.

Tips on mobile devices revealed!

Tips on mobile devices revealed!

Mobile phones have become an essential part of our lives. We use them both personally and professionally to access and store large amounts of data, some of which are very sensitive.

Stay clean with this week’s tips on malware

Stay clean with this week’s tips on malware

Any device that has software can get infected with malware. Malware is software designed to perform malicious actions.

Ackcent holds another Cyberlunch in Madrid

Ackcent holds another Cyberlunch in Madrid

Another edition of Ackcent's Cyberlunch took place recently in Madrid with the participation of Cylance , along with a number of CISOs and CIOs from companies operating in diverse business sectors.

Don’t get hooked! Check out this week’s tips on phishing

Don’t get hooked! Check out this week’s tips on phishing

91% of security incidents begin with a phishing email. Don't get hooked! Check out this week's tips on phishing and learn how to avoid falling victim to this type of scams.