Blog

Blog

Secure USB

How to safely use removable media in ICS networks?

It's been 10 years since the alert issued by Cybersecurity and Infrastructure Security Agency (CISA) indicating the risks associated with using USB media as one of the sources of threat to control systems. Despite the passage of years, these threats still exist, and...

How to safely use removable media in ICS networks?

It's been 10 years since the alert issued by Cybersecurity and Infrastructure Security Agency (CISA) indicating the risks associated with using USB media as one of the sources of threat to control systems. Despite the passage of years, these threats still...

read more

Ransomware – when data becomes hostage

You sit down to your computer, drink your morning coffee, and ... a multi-colored window is displayed on the monitor informing that your data has been encrypted, and only a cryptocurrency deposit on the given account will allow you to recover it. All photos,...

read more

Universal Hack and Play

UPnP (Universal Plug and Play – plug it in and it works) is a protocol that allows direct communication between computers and network devices. It is used in dozens of home appliances and enables devices such as computers, printers, TV sets, WiFi routers,...

read more

Fuzzing the GuruxDLMS.c library with AFL

Fuzzing (fuzz testing) is one of the most popular methods of looking for security-related bugs, especially the ones related to memory access (e.g. buffer overflow, use after free). Those are the potentially most dangerous bugs in software written in...

read more

Dariusz Fabiszewski – Executive Board Advisor in Seqred

We are pleased to welcome Dariusz Fabiszewski on board. Dariusz, with his 30 years of experience at the forefront of leading IT companies, will join Seqred’s team as the Executive Board Advisor. He will be responsible for strategic support of business...

read more

CVE-2019-14220: Local arbitrary file read in BlueStacks

BlueStacks is an Android emulator for Windows and Mac. During our tests, we have identified an arbitrary file read vulnerability that can be used by malicious applications to access the user's private data. The bug has been reported to the developers, and...

read more

How to use public Wi-Fi safely?

Free Wi-Fi is a service already available in almost every cafe, restaurant, hotel, station or airport. We like to get something for free, but many users are unaware of the risks involved when using a free and unsecured Wi-Fi network in public places. Here...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.