TARLOGIC's BLOG
Cybersecurity - Page 9
Cybersecurity articles with security analysis and ethical hacking technics information
Log4Shell vulnerability CVE-2021-44228, the new cyber-apocalypse
The detection of the Log4Shell vulnerability only 4 days ago could have serious consequences due to its high level of penetration[...]
Read more
Bluetooth KNOB and BLURtooth, second installment of Bluetooth cyber-attacks
The second instalment of the Bluetooth cyber-attacks focuses on two Bluetooth threats that have been gaining momentum in recent times[...]
Read more
Introduction to Bluetooth attacks
Tarlogic starts a series of articles analyzing Bluetooth attacks. In this first installment, we present BIAS and BLESA, two of this threats[...]
Read more
Vulnerability management
Performing a vulnerability management process is a thorough job in which the advantages of each step must be analyzed and detected[...]
Read more
Hardening of Windows systems: network authentication
Having professionals trained and involved with system hardening offers the possibility of having secure implementations and avoids misconfigurations[...]
Read more
SELinux importance for web hardening
Disabling this tool is still a common mistake. SELinux is a great help to do hardening How important can SELinux be? Can you imagine being in this situation? «Monday, 8 in the mor[...]
Read more
Dynamic Cybersecurity Risk Assessment
Constant changes in information systems and the emergence of new threats make it necessary to continuously update the risk status.[...]
Read more
Security healthiness as a risk metric of IT assets
Simple math for lots of tricky vulnerabilities. Measure the risk of IT assets in an agile way and take quick actions[...]
Read more
Evaluating WAF solutions
In this article, it is described a possible strategic approach to face the evaluation of WAF solutions.[...]
Read more
Hardware hacking: chip-off for beginners
Introduction to hardware hacking Before getting our hands dirty with hardware hacking, let’s start with a brief introduction to flash memories, a component that we will find very[...]
Read more