Advisory: Multiple vulnerabilities affecting Draytek routers

Routers are critical to modern networks, acting as the…


Car Hacking with Doggie at H2HC!

Last month, Doggie took the stage at the Car Hacking…


Good practices in Cybersecurity – Part 3

Good security practices go hand in hand with automation,…


Good practices in Cybersecurity – Part 2

Nowadays, we can distinguish various branches within a…


Tips Nmap Script Engine

Nmap (Network Mapper) is a popular network scanner that…


Release v4.3.5

We are happy to share the latest updates of our…


Web Application pentesting: a guide

In Security, the concept of attack-surface (or attack…


Nuclei: Attack Surface with Faraday

In Security, the concept of attack-surface (or attack…


Automating Security Tasks

In this second part (part one), we will show a step by step…