TARLOGIC's BLOG
Cybersecurity - Page 9

Cybersecurity articles with security analysis and ethical hacking technics information

Log4Shell vulnerability CVE-2021-44228, the new cyber-apocalypse
Log4Shell vulnerability CVE-2021-44228, the new cyber-apocalypse

The detection of the Log4Shell vulnerability only 4 days ago could have serious consequences due to its high level of penetration[...]

Read more
Bluetooth KNOB and BLURtooth, second installment of Bluetooth cyber-attacks
Bluetooth KNOB and BLURtooth, second installment of Bluetooth cyber-attacks

The second instalment of the Bluetooth cyber-attacks focuses on two Bluetooth threats that have been gaining momentum in recent times[...]

Read more
Introduction to Bluetooth attacks
Introduction to Bluetooth attacks

Tarlogic starts a series of articles analyzing Bluetooth attacks. In this first installment, we present BIAS and BLESA, two of this threats[...]

Read more
Vulnerability management
Vulnerability management

Performing a vulnerability management process is a thorough job in which the advantages of each step must be analyzed and detected[...]

Read more
Hardening of Windows systems: network authentication
Hardening of Windows systems: network authentication

Having professionals trained and involved with system hardening offers the possibility of having secure implementations and avoids misconfigurations[...]

Read more
SELinux importance for web hardening
SELinux importance for web hardening

Disabling this tool is still a common mistake. SELinux is a great help to do hardening How important can SELinux be? Can you imagine being in this situation? «Monday, 8 in the mor[...]

Read more
Dynamic Cybersecurity Risk Assessment
Dynamic Cybersecurity Risk Assessment

Constant changes in information systems and the emergence of new threats make it necessary to continuously update the risk status.[...]

Read more
Security healthiness as a risk metric of IT assets
Security healthiness as a risk metric of IT assets

Simple math for lots of tricky vulnerabilities. Measure the risk of IT assets in an agile way and take quick actions[...]

Read more
Evaluating WAF solutions
Evaluating WAF solutions

In this article, it is described a possible strategic approach to face the evaluation of WAF solutions.[...]

Read more
Hardware hacking: chip-off for beginners
Hardware hacking: chip-off for beginners

Introduction to hardware hacking Before getting our hands dirty with hardware hacking, let’s start with a brief introduction to flash memories, a component that we will find very[...]

Read more
1 6 7 8 9 10 11 12 14