by Justyna Thiede | 2 December 2020 | Blog-EN
Maciej Miszczyk Score is a Mediawiki extension which generates musical notation based on user-provided Lilypond or ABC markup. During our tests, we have determined it is vulnerable to remote code execution through Scheme code embedded in Lilypond markup. CVEID:...
by Justyna Thiede | 24 August 2020 | Blog-EN
Seqred A group of academics from Ruhr University Bochum and New York University Abu Dhabi have presented a new attack called ‘ReVoLTE’, that could let remote attackers break the encryption used by VoLTE voice calls and spy on targeted phone calls. The crux...
by Justyna Thiede | 5 August 2020 | Blog-EN
Sylwia Sławińska Recently the number of cyberattacks has increased year on year. It is also estimated that the number of attacks conducted with the use of ransomware increases by 350%¹ each year. Additionally, the Covid19 pandemic has caused an increase in the number...
by Justyna Thiede | 25 May 2020 | Blog-EN
Michał Kwiatkowski How to enable multi-factor authentication in Office 365 The coronavirus pandemic has forced many organisations to undergo a rapid digital transformation and switch to a remote workforce. This sudden change created a need for tools allowing users...
by Justyna Thiede | 10 May 2020 | Blog-EN
Michał Kwiatkowski Cloud computing is the foundation of many digital transformation projects. Currently, enterprises see progressively more value in the ability to scale the cloud environment, being able to transfer part of the responsibility for reliability onto a...
by Justyna Thiede | 9 April 2020 | Blog-EN
Łukasz Dudkowski Can Building Management Systems be Potential Attack Vectors for Industrial Control Systems? For many enterprises, working with advanced industrial systems the simultaneous implementation and use of Building Management Systems (BMS) is necessary....