You are here:
NTLM is the legacy authentication protocol in Windows environment. In the past few years, I've had the opportunity to write on this blog about NTLM…
The gRPC framework, and by extension gRPC-Web, is based on a binary data serialization format. This poses a challenge for penetration testers when…
Something a bit wild happened recently: A rival of LockBit decided to hack LockBit. Or, to put this into ransomware-parlance: LockBit got a post-paid…
The Network and Information Security Directive 2 (NIS2) is the European Union's latest framework for strengthening cyber security resilience across…
Collaborator Everywhere is a well-known extension for Burp Suite Professional to probe and detect out-of-band pingbacks.
We developed an upgrade to…
Intensive 5-day hands-on training about IT security.
How can SMEs reduce cyber risks effectively without embarking on complex projects? In 'LEADER digital', Cyrill Brunschwiler shares practical…
More blog posts