Internet of Things (IoT) and Operational Technology (OT) is an area that has grown strongly in recent years and is increasingly being used in the…

Read more

Nowadays, web developers rely mostly on well-established frameworks to develop their platform or web sites. These frameworks take care of many…

Read more

A journey into the discovery of privilege escalation vulnerabilities in the Lenovo Update process.

Read more

When accessing a remote server, one should always assume it has been compromised or might be in the near future. It is particularly crucial for users…

Read more

Sometimes, the good old credential dumping techniques just won't work. This is the story of how a bad actor could dump credentials on a fully-patched,…

Read more