TARLOGIC's BLOG
Cybersecurity - Page 6
Cybersecurity articles with security analysis and ethical hacking technics information
Tracking Ethereum blockchain crypto attackers: Measuring sandwich attacks
There are malicious actors perpetrating attacks in the Ethereum blockchain. However, due to its open and public nature, it is possible to identify and track down some of those atta[...]
Read moreCVE-2022-26134. Zero Day vulnerability affecting Atlassian Confluence
A remote code execution vulnerability affecting Atlassian Confluence products has recently been identified and assigned CVE-2022-26134. This vulnerability is exploitable without re[...]
Read morePLCTool plugin support
The newly implemented plugin support of PLCTool allows for the addition of new functionalities without the need of modifying the base code This article presents PLCTool’s plugin [...]
Read moreIntroduction to fuzzing: How to automatically discover bugs
Fuzzing techniques are used to detect security breaches and other bugs by generating inputs not contemplated by the programmer ¿What’s Fuzzing? – Security testing Fuzz[...]
Read moreIoT and embedded devices security analysis following OWASP
OWASP-FSTM methodology offers a standardized guide, step by step, of how to perform a security analysis on IoT and embedded devices. This guide is elaborated so that all pos[...]
Read moreSpring4Shell Vulnerability – CVE-2022-22965 and CVE-2022-22963
The Spring4Shell vulnerability affects a popular Java framework. Tarlogic analyzes the content and impact of this security breach.[...]
Read moreDirty Pipe Vulnerability CVE-2022-0847
This article describes the Dirty Pipe vulnerability (CVE-2022-0847), which initially affects the Linux kernel.[...]
Read morePLCTool, the Swiss army knife of smart meters
The following article is an introduction and description of the PLCTool project, along with a user’s guide to start investigating PRIME/DLMS networks and smart meters. As sup[...]
Read moreRisks of hardware design
This article presents a current problem, the risks of hardware design by using obsolete components or components about to end their life cycle[...]
Read moreMemory Reader: obtaining access keys from IoT devices
The security of IoT devices and memory readers often presents security gaps. Tarlogic’s Innovation team highlights some of them IoT devices are becoming more and more widespr[...]
Read more