Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…


Reverse engineering and game hacking resources

If you are curious about reverse engineering, cybersecurity…


A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to…


New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to…


Continuous testing, continuous security

Cybersecurity as a constant race, in which attackers and…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Understanding Spring4Shell

According to Cisco’s Annual Internet Report, nearly…


Privacy Preference Center