A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to…


AWS Common Issues – Part 2

Pentesters use a comprehensive and complete toolkit to…


New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to…


Released: Open Source Penetration Testing and VM Platform

A complete tool for pentesters, security experts,…


Cybersecurity is a secondary objective

A rapidly growing business must choose where to locate its…


Top 5 security tips: AWS Cloud Infrastructure

Improve your security posture on AWS Read the following…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Password strength

Passwords are the first aspect of computer security we…


Understanding Spring4Shell

According to Cisco’s Annual Internet Report, nearly…


Securing open source software (Part 2)

Open-source software increases its presence in data…