Cybersecurity blog

Cybersecurity articles with security analysis and ethical hacking technics information

Introduction to Bluetooth attacks

Introduction to Bluetooth attacks

Tarlogic starts a series of articles analyzing Bluetooth attacks. In this first installment, we present BIAS and BLESA, two of this threats[...]

Read more
Vulnerability management

Vulnerability management

Performing a vulnerability management process is a thorough job in which the advantages of each step must be analyzed and detected[...]

Read more
Hardening of Windows systems: network authentication

Hardening of Windows systems: network authentication

Having professionals trained and involved with system hardening offers the possibility of having secure implementations and avoids misconfigurations[...]

Read more
SELinux importance for web hardening

SELinux importance for web hardening

Disabling this tool is still a common mistake. SELinux is a great help to do hardening How important can SELinux be? Can you imagine being in this situation? «Monday, 8 in the mor[...]

Read more
Dynamic Cybersecurity Risk Assessment

Dynamic Cybersecurity Risk Assessment

Constant changes in information systems and the emergence of new threats make it necessary to continuously update the risk status.[...]

Read more
Security healthiness as a risk metric of IT assets

Security healthiness as a risk metric of IT assets

Simple math for lots of tricky vulnerabilities. Measure the risk of IT assets in an agile way and take quick actions[...]

Read more
Evaluation of WAF solutions

Evaluation of WAF solutions

In this article, it is described a possible strategic approach to face the evaluation of WAF solutions.[...]

Read more
Hardware hacking: chip-off for beginners

Hardware hacking: chip-off for beginners

Introduction to hardware hacking Before getting our hands dirty with hardware hacking, let’s start with a brief introduction to flash memories, a component that we will find very[...]

Read more
Introduction to Dynamic Cybersecurity Risk

Introduction to Dynamic Cybersecurity Risk

Defining the correct risks levels to cyber assaults that any company is exposed is a priority of this time. We present the first of three articles that, together, represent the int[...]

Read more
Security in PRIME networks – Current status

Security in PRIME networks – Current status

Since January 2019, all electricity meters for low power customers (up to 15 kW) in Spain are (or have been replaced by) smart electricity meters, allowing distributors to carry ou[...]

Read more
1 2 3 4