by David Nemeth | Mar 13, 2023 | blog
We’ve talked about this tiny gadget before: the Flipper Zero. Officially, it’s a $170 tamagotchi-fied hacking gadget with a sub-gigahertz radio and some accessory pins. Unofficially, it’s a menace’s best friend. Most recently, one tinkerer...
by David Nemeth | Mar 9, 2023 | Offsec
Persistence techniques are mechanisms or configurations threat actors use to maintain illicit access to compromised endpoints after gaining initial access. Persistence guarantees that attackers have endpoint access regardless of system restarts, changed credentials,...
by David Nemeth | Mar 6, 2023 | Fusion Center, Offsec
Below you will find information about the current security alerts of February 2023. VMware ESXi – CVE-2021-21974 A new vulnerability was reported by security researchers. This article describes an explosion in the compromises of VMware ESXi hypervisors with...
by David Nemeth | Feb 23, 2023 | Integration
The Open Systems Interconnection model (OSI model) is a conceptual model that ‘provides a common basis for the coordination of [ISO] standards development for the purpose of systems interconnection’. In the OSI reference model, the communications between a...
by David Nemeth | Nov 29, 2022 | ICS/OT Security
The issue of lacking OT operators and security professionals 30 November is the computer security day. Computer security can only be ensured if one is aware of its mistakes and shortcomings. The purpose of this blogpost is to highlight the importance of lacking OT...
Recent Comments