Explore >> Select a destination


You are here

blog.sicuranext.com
| | www.dragos.com
6.1 parsecs away

Travel
| | Discover more about OT network architectures and the security implications in the second blog post of a new fundamentals series from Dragos and SANS ICS.
| | thehackernews.com
8.4 parsecs away

Travel
| | Czechia and Germany reveal they were targets of a massive cyber espionage campaign by Russia-linked APT28 hacker group.
| | claroty.com
6.0 parsecs away

Travel
| | Team82 uncovered eight vulnerabilities that not only bypassed the authentication and authorization features in Unitronics UniStream PLCs, but also were able to chain to gain remote code execution on the device.
| | notsosecure.com
43.5 parsecs away

Travel
| Cryptography has various advantages including confidentiality of information. However overzealous reliance on cryptography for securing applications is a bad idea. In this blog Sunil Yadav our lead trainer for "Appsec for Developers" training class, will discuss a case study where a SQL injection vulnerability was identified and exploited via an encrypted payload. Note: We are