recent publications

From a Log to the Threat Hunting

OWASP Mobile Top 10 2024

read
From a Log to the Threat Hunting

Asset Discovery Approaches

read
From a Log to the Threat Hunting

IDOR: Critical vulnerability in web applications

read
From a Log to the Threat Hunting

Hidden Vulnerabilities: Analyzing Supply Chain Attacks

read
From a Log to the Threat Hunting

Pyramid of Pain in practice

read
From a Log to the Threat Hunting

Cybersecurity Awareness

read
From a Log to the Threat Hunting

Asset and Vulnerability Management

read
From a Log to the Threat Hunting

Keys to Data Leak Prevention

read
From a Log to the Threat Hunting

SEXi Ransomware: Impact on Virtualized Environments

read
From a Log to the Threat Hunting

SP 800-61r3 - Maturing Incident Response

read
From a Log to the Threat Hunting

Rayshadow - Vulnerability for AI framework

read
From a Log to the Threat Hunting

Real-Time Protection for Chrome users

read
From a Log to the Threat Hunting

Simplified Deployment of OWASP WSTG

read
From a Log to the Threat Hunting

Unveiling Fast Flux Techniques: Strategies to Protect Yourself

read
From a Log to the Threat Hunting

Adaptability and Security: Exploring the NIST Cybersecurity Framework 2.0

read
From a Log to the Threat Hunting

Lockbit Ransomware vs Operation Cronos

read
From a Log to the Threat Hunting

Deepfake: Deception and 20 million euros lost

read