Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
Botnet Mirai and largest Internet blackout

Botnet Mirai and largest Internet blackout

Let’s imagine a zombie army, like those straight from the silver screen – a charging horde that only has one goal. This reference to a Hollywood production can help us later understand the type of threat a botnet poses and how large it could be – an army of...

read more
Shodan improved – advanced reconnaissance with Shodan

Shodan improved – advanced reconnaissance with Shodan

A proper reconnaissance lays the groundwork for further offensive action during security testing. The ability to search for information and to organise it in the right way could determine whether the later stages of the process will be easy, or even feasible...

read more
Bug bounty for Seqred

Bug bounty for Seqred

June 14th Seqred got bug bounty for reporting vulnerability in a network device's firmware of one of leading producers. We have begun providing the service of vulnerability analysis in industrial automation and IoT devices recently - less than 5 months ago....

read more
Smart Buildings – Cybersecurity is key

Smart Buildings – Cybersecurity is key

Today’s buildings are more than concrete, steel and glass: they are structures filled with ctechnology readyutting edge technology designed to aid business activity 24 hours a day, all year round. These are intelligent buildings equipped with advanced...

read more
Behavioral biometrics – the next level of web security

Behavioral biometrics – the next level of web security

Biometrics – safety without the need for complex passwords Biometrics is a solution used every day by almost everyone. Every time you unlock your smartphone using your fingerprint, iris or facial recognition, your physical features are analysed and compared...

read more
Secon 2019, Security Exhibition and Conference

Secon 2019, Security Exhibition and Conference

Having just come back from SECON in Seoul, Korea, which is Asia's largest Security Exhibition and Conference, I was able to experience the security vision from the Asian perspective. The Exhibition area was divided into a number of sections but, from the...

read more
Password: password – or how John the Ripper attacks

Password: password – or how John the Ripper attacks

… a few pieces of advice from Cybersecurity Training SANS Anaheim 2019 If you were ever wondering if your password “has the power” to survive the attack of Dark Side of the Internet Force, first check if it is listed on Wikipedia's list of the most common...

read more
Memory Tagging Extension

Memory Tagging Extension

In Q4 2018 ARM announced new architecture Armv8.5-A. One of the introduced features is Memory Tagging Extension (MTE): hardware supported memory tagging. What is the purpose of MTE feature? Most of security vulnerabilities in C/C++ are caused by memory...

read more
IT Security Basics

IT Security Basics

I’d like to start with a few words from a song recorded many years back by Led Zeppelin and sung by Robert Plant: “… lots of people talking, few of them know … “ Remember this song? Yes, this is coming from Dazed and Confused. Conclusions from PWNing...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.