TARLOGIC's BLOG
Cybersecurity - Page 9
Cybersecurity articles with security analysis and ethical hacking technics information
Attacks to the Bluetooth Link Manager Protocol with BrakTooth
The third installment of the Bluetooth vulnerabilities focuses on denial of service and code execution attacks in BrakTooth[...]
Read more
Log4Shell vulnerability CVE-2021-44228, the new cyber-apocalypse
The detection of the Log4Shell vulnerability only 4 days ago could have serious consequences due to its high level of penetration[...]
Read more
Bluetooth KNOB and BLURtooth, second installment of Bluetooth cyber-attacks
The second instalment of the Bluetooth cyber-attacks focuses on two Bluetooth threats that have been gaining momentum in recent times[...]
Read more
Introduction to Bluetooth attacks
Tarlogic starts a series of articles analyzing Bluetooth attacks. In this first installment, we present BIAS and BLESA, two of this threats[...]
Read more
Vulnerability management
Performing a vulnerability management process is a thorough job in which the advantages of each step must be analyzed and detected[...]
Read more
Hardening of Windows systems: network authentication
Having professionals trained and involved with system hardening offers the possibility of having secure implementations and avoids misconfigurations[...]
Read more
SELinux importance for web hardening
Disabling this tool is still a common mistake. SELinux is a great help to do hardening How important can SELinux be? Can you imagine being in this situation? «Monday, 8 in the mor[...]
Read more
Dynamic Cybersecurity Risk Assessment
Constant changes in information systems and the emergence of new threats make it necessary to continuously update the risk status.[...]
Read more
Security healthiness as a risk metric of IT assets
Simple math for lots of tricky vulnerabilities. Measure the risk of IT assets in an agile way and take quick actions[...]
Read more
Evaluating WAF solutions
In this article, it is described a possible strategic approach to face the evaluation of WAF solutions.[...]
Read more