Blog
Blog
Botnet Mirai and largest Internet blackout
Let’s imagine a zombie army, like those straight from the silver screen – a charging horde that only has one goal. This reference to a Hollywood production can help us later understand the type of threat a botnet poses and how large it could be – an army of...
Shodan improved – advanced reconnaissance with Shodan
A proper reconnaissance lays the groundwork for further offensive action during security testing. The ability to search for information and to organise it in the right way could determine whether the later stages of the process will be easy, or even feasible...
Bug bounty for Seqred
June 14th Seqred got bug bounty for reporting vulnerability in a network device's firmware of one of leading producers. We have begun providing the service of vulnerability analysis in industrial automation and IoT devices recently - less than 5 months ago....
Smart Buildings – Cybersecurity is key
Today’s buildings are more than concrete, steel and glass: they are structures filled with ctechnology readyutting edge technology designed to aid business activity 24 hours a day, all year round. These are intelligent buildings equipped with advanced...
Behavioral biometrics – the next level of web security
Biometrics – safety without the need for complex passwords Biometrics is a solution used every day by almost everyone. Every time you unlock your smartphone using your fingerprint, iris or facial recognition, your physical features are analysed and compared...
Secon 2019, Security Exhibition and Conference
Having just come back from SECON in Seoul, Korea, which is Asia's largest Security Exhibition and Conference, I was able to experience the security vision from the Asian perspective. The Exhibition area was divided into a number of sections but, from the...
Password: password – or how John the Ripper attacks
… a few pieces of advice from Cybersecurity Training SANS Anaheim 2019 If you were ever wondering if your password “has the power” to survive the attack of Dark Side of the Internet Force, first check if it is listed on Wikipedia's list of the most common...
Memory Tagging Extension
In Q4 2018 ARM announced new architecture Armv8.5-A. One of the introduced features is Memory Tagging Extension (MTE): hardware supported memory tagging. What is the purpose of MTE feature? Most of security vulnerabilities in C/C++ are caused by memory...
IT Security Basics
I’d like to start with a few words from a song recorded many years back by Led Zeppelin and sung by Robert Plant: “… lots of people talking, few of them know … “ Remember this song? Yes, this is coming from Dazed and Confused. Conclusions from PWNing...