Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…


Reverse engineering and game hacking resources

If you are curious about reverse engineering, cybersecurity…


A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to…


New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to…


Continuous testing, continuous security

Cybersecurity as a constant race, in which attackers and…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Understanding Spring4Shell

According to Cisco’s Annual Internet Report, nearly…