TARLOGIC's BLOG
Cybersecurity - Page 7
Cybersecurity articles with security analysis and ethical hacking technics information
Log4shell full picture: All the vulnerabilities affecting Log4j
Vulnerabilities affecting the Log4j component have triggered a worldwide earthquake. Tarlogic presents a series of recommendations to prevent and contain the threats regarding Log4[...]
Read moreWe tracked 800 million transactions in the Ethereum Blockchain. Here is how we did it.
Something really big is going on the Ethereum Blockchain. Fraud, speculation, financial products, tax evasion, million-dollar robberies, art, games, a new monetary system… Yo[...]
Read moreTracking JNDI attacks: Hunting Log4Shell in your network
BlackArrow's Threat Hunting team uses a Minecraft server to illustrate the impact of Log4Shell from both an attacker's and defender's point of view[...]
Read moreAttacks to the Bluetooth Link Manager Protocol with BrakTooth
The third installment of the Bluetooth vulnerabilities focuses on denial of service and code execution attacks in BrakTooth[...]
Read moreLog4Shell vulnerability CVE-2021-44228, the new cyber-apocalypse
The detection of the Log4Shell vulnerability only 4 days ago could have serious consequences due to its high level of penetration[...]
Read moreBluetooth KNOB and BLURtooth, second installment of Bluetooth cyber-attacks
The second instalment of the Bluetooth cyber-attacks focuses on two Bluetooth threats that have been gaining momentum in recent times[...]
Read moreIntroduction to Bluetooth attacks
Tarlogic starts a series of articles analyzing Bluetooth attacks. In this first installment, we present BIAS and BLESA, two of this threats[...]
Read moreVulnerability management
Performing a vulnerability management process is a thorough job in which the advantages of each step must be analyzed and detected[...]
Read moreHardening of Windows systems: network authentication
Having professionals trained and involved with system hardening offers the possibility of having secure implementations and avoids misconfigurations[...]
Read moreSELinux importance for web hardening
Disabling this tool is still a common mistake. SELinux is a great help to do hardening How important can SELinux be? Can you imagine being in this situation? «Monday, 8 in the mor[...]
Read more