Seqred June 14th Seqred got bug bounty for reporting vulnerability in a network device’s firmware of one of leading producers. We have begun providing the service of vulnerability analysis in industrial automation and IoT devices recently – less than 5...
Krzysztof Graj Having just come back from SECON in Seoul, Korea, which is Asia’s largest Security Exhibition and Conference, I was able to experience the security vision from the Asian perspective. The Exhibition area was divided into a number of sections but,...
Krzysztof Graj … a few pieces of advice from Cybersecurity Training SANS Anaheim 2019 If you were ever wondering if your password “has the power” to survive the attack of Dark Side of the Internet Force, first check if it is listed on Wikipedia’s list of the...
About our blog
As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.
#Android #emulators: a #security perspective
- Why should we worry about emulators security?
- What #vulnerabilities have we found in the most popular emulators?
- How can they be used by a malicious attacker?
If you ever wondered how to assess #vulnerabilities in the protocol implementation (this time DLMS/Cosem) you can find some information about our approach in a new article on our blog. I also encourage to click observe button on @Seqred_ profile.
Today at #SIwE conference - Information Systems in #Energetics. Join us to see live demo of the #attack on the IEC60870-5: 104 protocol and talk about #SmartMeters configuration errors to carry out an effective attack on the energy supplier and consumer.
Przy korzystaniu z naszego serwisu używamy plików cookies. Ustawienia i rodzaje plików cookies oraz sposoby korzystania i usuwania ich, można zmienić w swojej przeglądarce. Brak zmiany ustawień jest jednoznaczny z ich akceptacją. Pełna treść informacji o cookies zawarta jest w naszej Polityce Prywatności. Czytaj więcej