SEQRED
  • About
    • Seqred
    • Press Releases
  • Services
    • Critical Infrastructure protection
    • Security Audit ICS
    • Smart Building Cybersecurity
    • Cybersecurity Bill of Materials
    • Penetration tests
    • Security code review
    • Secure Product Development
    • Red Team
    • Cloud Services Security
    • Network segmentation
    • Mobile device security
    • Threat Intelligence
    • Open Source Intelligence / OSINT
    • NIS Directive Audit
    • AMI system security
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
  • PLPL
Select Page
Multiple vulnerabilities in GameLoop – remote code execution, privilege escalation

Multiple vulnerabilities in GameLoop – remote code execution, privilege escalation

by Justyna Thiede | 17 December 2020 | Blog-EN, Newest post

Maciej Miszczyk Multiple vulnerabilities in GameLoop – remote code execution, privilege escalation Gameloop is an Android emulator released by Tencent. During our tests, we have identified multiple vulnerabilities which can lead to code execution and privilege...
Multiple vulnerabilities in GameLoop – remote code execution, privilege escalation

CVE-2020-29007 – remote code execution in Mediawiki Score

by Justyna Thiede | 2 December 2020 | Blog-EN

Maciej Miszczyk Score is a Mediawiki extension which generates musical notation based on user-provided Lilypond or ABC markup. During our tests, we have determined it is vulnerable to remote code execution through Scheme code embedded in Lilypond markup. CVEID:...
ReVoLTE – an attack exploiting the reuse of the same keystream by vulnerable base stations

ReVoLTE – an attack exploiting the reuse of the same keystream by vulnerable base stations

by Justyna Thiede | 24 August 2020 | Blog-EN

Seqred A group of academics from Ruhr University Bochum and New York University Abu Dhabi have presented a new attack called ‘ReVoLTE’, that could let remote attackers break the encryption used by VoLTE voice calls and spy on targeted phone calls. The crux...
Cyber Kill Chain – what is it and how to use it to stop advanced methods of attack?

Cyber Kill Chain – what is it and how to use it to stop advanced methods of attack?

by Justyna Thiede | 5 August 2020 | Blog-EN

Sylwia Sławińska Recently the number of cyberattacks has increased year on year. It is also estimated that the number of attacks conducted with the use of ransomware increases by 350%¹ each year. Additionally, the Covid19 pandemic has caused an increase in the number...
How to enable multi-factor authentication in Office 365

How to enable multi-factor authentication in Office 365

by Justyna Thiede | 25 May 2020 | Blog-EN

Michał Kwiatkowski How to enable multi-factor authentication in Office 365 The coronavirus pandemic has forced many organisations to undergo a rapid digital transformation and switch to a remote workforce. This sudden change created a need for tools allowing users...
Cloud computing security – identity and access management comparison for GCP and AWS

Cloud computing security – identity and access management comparison for GCP and AWS

by Justyna Thiede | 10 May 2020 | Blog-EN

Michał Kwiatkowski Cloud computing is the foundation of many digital transformation projects. Currently, enterprises see progressively more value in the ability to scale the cloud environment, being able to transfer part of the responsibility for reliability onto a...
« Older Entries

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.

News

Seqred_SEQRED@Seqred_·
14 Jan

Czy wiesz, co producent lub integrator zapisał w Twoim sterowniku #PLC?
Które obszary są ważne przy ocenie bezpieczeństwa i jakości kodu?

Zapraszamy na wykład "Bezpieczeństwo kodu sterowników PLC" @JozefSulwinski i Michał Stępień na #InfraSECForum

https://infrasecforum.pl/agenda-2021/

Reply on Twitter 1349653584997212161Retweet on Twitter 1349653584997212161Like on Twitter 13496535849972121611Twitter 1349653584997212161
Seqred_SEQRED@Seqred_·
8 Dec

Posiadasz doświadczenie w realizacji projektów związanych z oceną poziomu cyberbezpieczeństwa organizacji?

Dołącz do zespołu Seqred!

… lub poleć nam kogoś, kto pasuje na to stanowisko.

Sprawdź: https://seqred.pl/kariera/

#rekrutacja #cyberbezpieczeństwo #praca #pracaIT

Reply on Twitter 1336262886105239555Retweet on Twitter 1336262886105239555Like on Twitter 13362628861052395552Twitter 1336262886105239555
Seqred_SEQRED@Seqred_·
4 Dec

Don’t miss "Hacking Advanced Metering Infrastructure" by @swaczynski_k at @TheHackSummit

LIVE streaming 5 XII, VoD like in Netflix until II 2021

Krzysztof will guide you through a complete #ICS attack vector aimed at compromising #smartmeters and #AMI

https://thehacksummit.com

Reply on Twitter 1334776972443082753Retweet on Twitter 1334776972443082753Like on Twitter 13347769724430827532Twitter 1334776972443082753
Seqred_SEQRED@Seqred_·
2 Dec

Jak kompleksowo wbudować #cyberbezpieczeństwo we wszystkie fazy inwestycji w #smartbuilding?

To już ostatnia szansa, aby zapisać się na wirtualne spotkanie w ramach Projekt BMS, które poprowadzi @swaczynski_k

Zarejestruj się dziś: https://projektbms.pl

#facilitymanagement

Reply on Twitter 1334087672785227776Retweet on Twitter 1334087672785227776Like on Twitter 13340876727852277762Twitter 1334087672785227776
Seqred_SEQRED@Seqred_·
27 Nov

Netflix o #security? To już się dzieje!

Już za tydzień rozpoczyna się @TheHackSummit, a w nim 110 wykładów on-demand

Ogromna dawka wiedzy z zakresu #cybersecurity, w tym dwa wykłady z udziałem #Seqred

Zarejestruj się: https://thehacksummit.com

#OTsecurity #ITsecurity

Reply on Twitter 1332237306229641217Retweet on Twitter 13322373062296412173Like on Twitter 13322373062296412174Twitter 1332237306229641217

Search on blog

Categories

Tags

ABC security conference critical infrastructure cve cybersecurity energy fuzzing ICS information security IT security leadership management memory tagging news OT OT security processors proptech ransomware research secure password Shodan smart building UPnP vulnerability

SEQRED Sp. z o.o.
Rybnicka 52, 02-432 Warszawa
tel. +48 22 292 32 23
fax +48 22 292 32 21
biuro@seqred.pl

Privacy Policy All rights reserved © SEQRED 2021

Przy korzystaniu z naszego serwisu używamy plików cookies. Ustawienia i rodzaje plików cookies oraz sposoby korzystania i usuwania ich można w każdej chwili zmienić w swojej przeglądarce. Korzystanie z witryny bez zmiany ustawień przeglądarki dotyczących cookies oznacza, że będą one umieszczane w Twoim urządzeniu. W każdej chwili możesz dokonać zmiany ustawień przeglądarki dotyczących cookies. Pełna treść informacji o cookies zawarta jest w naszej Polityce Prywatności. Czytaj więcej