Tarlogic's Blog - Cybersecurity - Page 6

Cybersecurity articles with security analysis and ethical hacking technics information

Risks of hardware design
Risks of hardware design

This article presents a current problem, the risks of hardware design by using obsolete components or components about to end their life cycle[...]

Read more
Memory Reader: obtaining access keys from IoT devices
Memory Reader: obtaining access keys from IoT devices

The security of IoT devices and memory readers often presents security gaps. Tarlogic’s Innovation team highlights some of them IoT devices are becoming more and more widespr[...]

Read more
Log4shell full picture: All the vulnerabilities affecting Log4j
Log4shell full picture: All the vulnerabilities affecting Log4j

Vulnerabilities affecting the Log4j component have triggered a worldwide earthquake. Tarlogic presents a series of recommendations to prevent and contain the threats regarding Log4[...]

Read more
We tracked 800 million transactions in the Ethereum Blockchain. Here is how we did it.
We tracked 800 million transactions in the Ethereum Blockchain. Here is how we did it.

Something really big is going on the Ethereum Blockchain. Fraud, speculation, financial products, tax evasion, million-dollar robberies, art, games, a new monetary system… Yo[...]

Read more
Tracking JNDI attacks: Hunting Log4Shell in your network
Tracking JNDI attacks: Hunting Log4Shell in your network

BlackArrow's Threat Hunting team uses a Minecraft server to illustrate the impact of Log4Shell from both an attacker's and defender's point of view[...]

Read more
Attacks to the Bluetooth Link Manager Protocol with BrakTooth
Attacks to the Bluetooth Link Manager Protocol with BrakTooth

The third installment of the Bluetooth vulnerabilities focuses on denial of service and code execution attacks in BrakTooth[...]

Read more
Log4Shell vulnerability CVE-2021-44228, the new cyber-apocalypse
Log4Shell vulnerability CVE-2021-44228, the new cyber-apocalypse

The detection of the Log4Shell vulnerability only 4 days ago could have serious consequences due to its high level of penetration[...]

Read more
Bluetooth KNOB and BLURtooth, second installment of Bluetooth cyber-attacks
Bluetooth KNOB and BLURtooth, second installment of Bluetooth cyber-attacks

The second instalment of the Bluetooth cyber-attacks focuses on two Bluetooth threats that have been gaining momentum in recent times[...]

Read more
Introduction to Bluetooth attacks
Introduction to Bluetooth attacks

Tarlogic starts a series of articles analyzing Bluetooth attacks. In this first installment, we present BIAS and BLESA, two of this threats[...]

Read more
Vulnerability management
Vulnerability management

Performing a vulnerability management process is a thorough job in which the advantages of each step must be analyzed and detected[...]

Read more
1 3 4 5 6 7 8 9 12