TARLOGIC's BLOG
Cybersecurity - Page 9
Cybersecurity articles with security analysis and ethical hacking technics information
Tracking JNDI attacks: Hunting Log4Shell in your network
BlackArrow's Threat Hunting team uses a Minecraft server to illustrate the impact of Log4Shell from both an attacker's and defender's point of view[...]
Read more
Attacks to the Bluetooth Link Manager Protocol with BrakTooth
The third installment of the Bluetooth vulnerabilities focuses on denial of service and code execution attacks in BrakTooth[...]
Read more
Log4Shell vulnerability CVE-2021-44228, the new cyber-apocalypse
The detection of the Log4Shell vulnerability only 4 days ago could have serious consequences due to its high level of penetration[...]
Read more
Bluetooth KNOB and BLURtooth, second installment of Bluetooth cyber-attacks
The second instalment of the Bluetooth cyber-attacks focuses on two Bluetooth threats that have been gaining momentum in recent times[...]
Read more
Introduction to Bluetooth attacks
Tarlogic starts a series of articles analyzing Bluetooth attacks. In this first installment, we present BIAS and BLESA, two of this threats[...]
Read more
Vulnerability management
Performing a vulnerability management process is a thorough job in which the advantages of each step must be analyzed and detected[...]
Read more
Hardening of Windows systems: network authentication
Having professionals trained and involved with system hardening offers the possibility of having secure implementations and avoids misconfigurations[...]
Read more
SELinux importance for web hardening
Disabling this tool is still a common mistake. SELinux is a great help to do hardening How important can SELinux be? Can you imagine being in this situation? «Monday, 8 in the mor[...]
Read more
Dynamic Cybersecurity Risk Assessment
Constant changes in information systems and the emergence of new threats make it necessary to continuously update the risk status.[...]
Read more
Security healthiness as a risk metric of IT assets
Simple math for lots of tricky vulnerabilities. Measure the risk of IT assets in an agile way and take quick actions[...]
Read more