by Anna Krukowska | 30 September 2019 | Blog-EN, Newest post
Maciej Miszczyk BlueStacks is an Android emulator for Windows and Mac. During our tests, we have identified an arbitrary file read vulnerability that can be used by malicious applications to access the user’s private data. The bug has been reported to the...
by Anna Krukowska | 12 September 2019 | Blog-EN
Seqred Free Wi-Fi is a service already available in almost every cafe, restaurant, hotel, station or airport. We like to get something for free, but many users are unaware of the risks involved when using a free and unsecured Wi-Fi network in public places. Here are...
by Anna Krukowska | 2 September 2019 | Blog-EN
Michał Stępień In recent years, industrial control systems have repeatedly been the victim of cyberattacks. The multidimensional attack on Ukraine’s energy infrastructure deprived of energy of nearly 225,000 users. Can network segmentation help protect against...
by Anna Krukowska | 10 July 2019 | Blog-EN
Seqred It was a period of hard work, but also led to many breakthroughs – we have assembled a team of specialists from various fields of cyber security and built the infrastructure necessary for our work. Our engineers have created laboratories for the purposes...
by Anna Krukowska | 8 July 2019 | Blog-EN
Błażej Dusik Let’s imagine a zombie army, like those straight from the silver screen – a charging horde that only has one goal. This reference to a Hollywood production can help us later understand the type of threat a botnet poses and how large it could be – an army...