recent publications

From a Log to the Threat Hunting

Vulnerability Assessment

read
From a Log to the Threat Hunting

Introduction to the electromagnetic and radioelectric spectrum, how does it affect security?

read
From a Log to the Threat Hunting

OWASP Guide to APIs 2023

read
From a Log to the Threat Hunting

Purple teaming: Operations and Nuances

read
From a Log to the Threat Hunting

CVSSv4 and the pursuit of precision

read
From a Log to the Threat Hunting

Implementing effective controls in an ICS (ISO IEC 62443 standard)

read
From a Log to the Threat Hunting

Trends and approaches for cybersecurity 2023-2027

read
From a Log to the Threat Hunting

Laboratory environment for offensive practices in industrial networks

read
From a Log to the Threat Hunting

Hypotheses in the field of cyber threat detection

read
From a Log to the Threat Hunting

The Shock wave of Data Breaches(The T-Mobile case)

read
Follina a silent Client-Side

Attacking industrial networks (Siemens)

read
From a Log to the Threat Hunting

Understanding industrial networks before attacking them

read
From a Log to the Threat Hunting

From a Log to the Threat Hunting

read
Forgotten Protocols: NTP (Network Time Protocol)

Forgotten Protocols: NTP (Network Time Protocol)

read
Forgotten Protocols: NTP (Network Time Protocol)

Data-flow analysis

read