Blog
Blog
Ransomware – when data becomes hostage
You sit down to your computer, drink your morning coffee, and ... a multi-colored window is displayed on the monitor informing that your data has been encrypted, and only a cryptocurrency deposit on the given account will allow you to recover it. All photos,...
Universal Hack and Play
UPnP (Universal Plug and Play – plug it in and it works) is a protocol that allows direct communication between computers and network devices. It is used in dozens of home appliances and enables devices such as computers, printers, TV sets, WiFi routers,...
Fuzzing the GuruxDLMS.c library with AFL
Fuzzing - methods of looking for security-related bugs Fuzzing (fuzz testing) is one of the most popular methods of looking for security-related bugs, especially the ones related to memory access (e.g. buffer overflow, use after free). Those are the...
Smart Buildings – nearly 40 percent of systems attacked by malware
On 19th September 2019, Kaspersky published a report on cybersecurity threats in Smart Building systems. Four out of ten computers used to manage building systems fell victim to a malware attack in the first half of 2019. Infection attempts most often...
Dariusz Fabiszewski – Executive Board Advisor in Seqred
We are pleased to welcome Dariusz Fabiszewski on board. Dariusz, with his 30 years of experience at the forefront of leading IT companies, will join Seqred’s team as the Executive Board Advisor. He will be responsible for strategic support of business...
Electroenergetics of the XXI century – the evolution of threats
Until recently, physical and natural threats were the greatest, if not the only ones, to menace the proper functioning of energy systems. With the advent of smart grids and automated devices, power generation has become a sensitive target for cyber attacks...
CVE-2019-14220: Local arbitrary file read in BlueStacks
BlueStacks is an Android emulator for Windows and Mac. During our tests, we have identified an arbitrary file read vulnerability that can be used by malicious applications to access the user's private data. The bug has been reported to the developers, and...
How to use public Wi-Fi safely?
Free Wi-Fi is a service already available in almost every cafe, restaurant, hotel, station or airport. We like to get something for free, but many users are unaware of the risks involved when using a free and unsecured Wi-Fi network in public places. Here...
Network segmentation in protection of industrial control systems
In recent years, industrial control systems have repeatedly been the victim of cyberattacks. The multidimensional attack on Ukraine's energy infrastructure deprived of energy of nearly 225,000 users. Can network segmentation help protect against an attack or...
SEQRED’s first year of operation is behind us!
It was a period of hard work, but also led to many breakthroughs - we have assembled a team of specialists from various fields of cyber security and built the infrastructure necessary for our work. Our engineers have created laboratories for the purposes of...