recent publications

Follina a silent Client-Side

Attacking industrial networks (Siemens)

read
From a Log to the Threat Hunting

Understanding industrial networks before attacking them

read
From a Log to the Threat Hunting

From a Log to the Threat Hunting

read
Forgotten Protocols: NTP (Network Time Protocol)

Forgotten Protocols: NTP (Network Time Protocol)

read
Forgotten Protocols: NTP (Network Time Protocol)

Data-flow analysis

read

Trojan detection techniques in hardware implementations

read

NIST Cybersecurity Framework v2.0

read

EEPROM 1-Wire Protected with SHA-1 discovery & Low-Cost Side-Channel Attack

read

Dataflow on servers

read

Cybersecurity in the digital age of healthcare

read

Cybersecurity in the fourth Industrial Revolution (Industry 4.0)

read

Cyber Security guide for gamers

read
Artificial intelligence in Cybersecurity

Artificial intelligence in Cybersecurity

read
Why use flow data for monitoring?

Why use flow data for monitoring?

read
Sun Tzu and The Art of Cyberdeceit

Sun Tzu and The Art of Cyberdeceit

read
Automating proxy deployment with Python

Automating proxy deployment with Python

read