Explore the world
of Cybersecurity

  • Application security

    Cybersecurity: A Challenge for Supply Chains

    Implementing strong software supply chain security is essential to protecting organizations from growing cyber threats and ensuring operational continuity. In this article, we explore the dependencies between the software supply chain and the production chain.

  • Application security

    Introduction to Application Security

    Application security is the combination of tools and practices to identify, fix, and prevent vulnerabilities throughout the application's development lifecycle. In the article, we explain its importance through data and statistics.

  • Application security

    NIS2 Directive: A Step Forward in the EU’s Cybersecurity Strategy

    With the NIS2 directive, the European Union takes a step forward in defining its cybersecurity strategy, aiming to strengthen the security of networks and information systems across all member states.

  • Vulnerability research

    64 bytes and a ROP chain – A journey through nftables – Part 2

    In my previous blog post, we discussed the vulnerability research and validation process. Now, let's get to the exploitation of a stack overflow in the interrupt context by dividing it into two main parts: defeating KASLR and privilege escalation.

  • Vulnerability research

    64 bytes and a ROP chain – A journey through nftables – Part 1

    The purpose of this article is to dive into the process of vulnerability research in the Linux kernel through my experience that led to the finding of CVE-2023-0179 and a fully functional Local Privilege Escalation (LPE). By the end of this post, the reader should be more comfortable interacting with the nftables component and approaching the new mitigations encountered while exploiting the kernel stack from the network context.

Discover how we can help you

Together, we’ll find the best solutions to tackle the challenges your business faces every day.

    * required fields