SolarWinds supply chain attack explainedToday we will be discussing a programmer’s worst nightmare. Having a breach in one of your trusted software vendors.Sep 11, 20231Sep 11, 20231
As a service for threat actorsAn especially devilish form of phishing campaign that circumvents MFASep 4, 20231Sep 4, 20231
Breaking Down the Cybersecurity Battlefield: The Unified Kill Chain ExplainedIn the digital era, cyber threats are becoming more sophisticated, therefore everyone must contribute to cyber defence.Aug 28, 2023Aug 28, 2023
The cybersecurity architectureTwo components to gather and act on logs and event in a cybersecurity architecture. Lets discuss the SIEM and the SOC!Aug 21, 2023Aug 21, 2023
Gameover(lay)FSWe discuss two different attack flows (CVE-2023–2640 and CVE-2023–32629) targeting the overlayFS.Aug 14, 2023Aug 14, 2023
LLMs for phishingLLMs have entered cybersecurity, phishing can now be fully automated with more sophisticated prompts.Aug 7, 2023Aug 7, 2023
Azure CLI code injectionIt is time for another vulnerability! This time concerning the Azure command line interface (Azure CLI).Jul 31, 2023Jul 31, 2023
nOAuth Azure vulnerabilityA new vulnerability about Azure AD was discovered called nOAuth. The vulnerability could lead to a large amount of data theftJul 26, 2023Jul 26, 2023
Solving complex problems with Particle Swarm OptimizationIn nature we see flocks of birds creating interesting patterns in the sky but how can we capture those motions to solve complex…Sep 19, 2021Sep 19, 2021
The different aspects of containerizationContainerization becomes an increasingly large aspects of companies digital strategies. Therefore it is important to know a high level…Aug 1, 2021Aug 1, 2021