Blog

Blog

Cloud computing security: identity and access management

Cloud computing security: identity and access management comparison for GCP and AWS

Cloud computing is the foundation of many digital transformation projects. Currently, enterprises see progressively more value in the ability to scale the cloud environment, being able to transfer part of the responsibility for reliability onto a cloud service...

Fuzzing the GuruxDLMS.c library with AFL

Fuzzing - methods of looking for security-related bugs Fuzzing (fuzz testing) is one of the most popular methods of looking for security-related bugs, especially the ones related to memory access (e.g. buffer overflow, use after free). Those are the...

read more

Dariusz Fabiszewski – Executive Board Advisor in Seqred

We are pleased to welcome Dariusz Fabiszewski on board. Dariusz, with his 30 years of experience at the forefront of leading IT companies, will join Seqred’s team as the Executive Board Advisor. He will be responsible for strategic support of business...

read more

CVE-2019-14220: Local arbitrary file read in BlueStacks

BlueStacks is an Android emulator for Windows and Mac. During our tests, we have identified an arbitrary file read vulnerability that can be used by malicious applications to access the user's private data. The bug has been reported to the developers, and...

read more

How to use public Wi-Fi safely?

Free Wi-Fi is a service already available in almost every cafe, restaurant, hotel, station or airport. We like to get something for free, but many users are unaware of the risks involved when using a free and unsecured Wi-Fi network in public places. Here...

read more

SEQRED’s first year of operation is behind us!

It was a period of hard work, but also led to many breakthroughs - we have assembled a team of specialists from various fields of cyber security and built the infrastructure necessary for our work. Our engineers have created laboratories for the purposes of...

read more

Botnet Mirai and largest Internet blackout

Let’s imagine a zombie army, like those straight from the silver screen – a charging horde that only has one goal. This reference to a Hollywood production can help us later understand the type of threat a botnet poses and how large it could be – an army of...

read more

Shodan improved – advanced reconnaissance with Shodan

A proper reconnaissance lays the groundwork for further offensive action during security testing. The ability to search for information and to organise it in the right way could determine whether the later stages of the process will be easy, or even feasible...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.