Blog Archive
- This is how easy it is to hack a smart home
- DFIR Guide: Best book of the year
- Compromising Azure cloud through sensitive API permissions
- Security Concerns in an Electro-Stimulator Device
- Red Wizard - User friendly, automated infrastructure for Red Team - Part 1
- What is social engineering and what can you do about it?
- Timeroasting: Attacking Trust Accounts in Active Directory
- Secura participates in the REWIRE Research and Innovation Action
- BIO voor gemeentes: een invuloefening of écht veilig?
- Living-off-the-webpage: Space-efficient Persistent XSS to RCE in FortiADC
- How a Malicious App Has Been Targeting FIFA Qatar Fans
- It's not just about knowledge on cybersecurity, it's also about behavior
- The Whats, Whens, and Hows of NIS2 (Updated)
- Secura Develops 'BrokenAzure.Cloud', a CTF Tool to Test Azure Cloud Knowledge
- Trilogy ‘Research to the Human Behavior in Cybersecurity’
- TPM Sniffing Attacks Against Non-Bitlocker Targets
- Russian-Ukrainian Cyberwarfare - What You Need to Know
- Log4Shell: How does it work and what steps to take?
- Ponemon 2021 State of Industrial Cybersecurity
- OWASP Top 10 - 2021
- IoT products required to meet minimum security standards starting 2024
- iOS Apps on ARM Macs: Pentesting Opportunities | Part II
- New UNECE Regulations Paving the Way for the Automotive Industry
- iOS Apps on ARM Macs: Pentesting Opportunities
- IoT: voor alles een ander wachtwoord
- Security Challenges of a Cloud Migration
- How Secure is a CIS/AWS Compliant Cloud Environment?
- Nooit te oud om te leren
- How Small Vulnerabilities Become a Recipe for Disaster
- Thuiswerken
- Hacking Jenkins to prevent a cloud data breach
- Common Criteria Certification 101 and Current Tendencies
- Pentester’s View on “Digital Twins Technology”
- How to stay 100% safe online? Let me show you how by hacking your Facebook account!
- Privacy Control Framework NOREA
- Attacking and mitigating Windows PXE environments
- Creating a path through IoT Security with ETSI EN 303 645
- Abusing Bash for Windows (Cygwin, WSL)
- ETSI Releases New EN 303 645 Standard for Consumer IoT
- Concealed Information in the Windows Registry
- Challenge the Cyber CTF 2020
- CVE Awards 2020
- Duizenden euro's kwijt door spoofing
- De psychologie achter de babbeltruc
- Help! Een incident!
- Yes! Een incident!
- Slimmer dan de hacker
- Hotel Geen Idee
- How do I select a security awareness solution for my business?
- Practical GPRS MitM attack- mobile setup with YateBTS
- IoT Solar Inverters & Trickle-Down Vulnerabilities
- Severe Citrix Vulnerability Update: Implications and Protection
- Kerberoasting - Exploiting Kerberos to Compromise Microsoft Active Directory
- Own Your Own Home: Home Camera Takeover
- Zerologon: Instantly Become Domain Admin by Subverting Netlogon Cryptography (CVE-2020-1472)
- Taking over Windows Systems with a Netlogon Man-in-the-Middle Attack (CVE-2019-1424)