Recent news in media

No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol
  

No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol

OPC UA is a standardized communication protocol that is widely used in the areas of industrial automation and IoT. It

Lost in Translation: Exploiting Unicode Normalization
  

Lost in Translation: Exploiting Unicode Normalization

As web applications evolve, so do their data processing pipelines—handling Unicode normalization, encoding, and translation before storing or executing user

From Spoofing to Tunneling: New Red Team’s Networking Techniques for Initial Access and Evasion
  

From Spoofing to Tunneling: New Red Team’s Networking Techniques for Initial Access and Evasion

Gaining initial access to an intranet is one of the most challenging parts of red teaming. If an attack chain

Blogs

Video

Latest posts