Explore the world
of Cybersecurity
- Application security
Cybersecurity: A Challenge for Supply Chains
Implementing strong software supply chain security is essential to protecting organizations from growing cyber threats and ensuring operational continuity. In this article, we explore the dependencies between the software supply chain and the production chain.
- Application security
Introduction to Application Security
Application security is the combination of tools and practices to identify, fix, and prevent vulnerabilities throughout the application's development lifecycle. In the article, we explain its importance through data and statistics.
- Application security
NIS2 Directive: A Step Forward in the EU’s Cybersecurity Strategy
With the NIS2 directive, the European Union takes a step forward in defining its cybersecurity strategy, aiming to strengthen the security of networks and information systems across all member states.
- Vulnerability research
64 bytes and a ROP chain – A journey through nftables – Part 2
In my previous blog post, we discussed the vulnerability research and validation process. Now, let's get to the exploitation of a stack overflow in the interrupt context by dividing it into two main parts: defeating KASLR and privilege escalation.
- Vulnerability research
64 bytes and a ROP chain – A journey through nftables – Part 1
The purpose of this article is to dive into the process of vulnerability research in the Linux kernel through my experience that led to the finding of CVE-2023-0179 and a fully functional Local Privilege Escalation (LPE). By the end of this post, the reader should be more comfortable interacting with the nftables component and approaching the new mitigations encountered while exploiting the kernel stack from the network context.
Discover how we can help you
Together, we’ll find the best solutions to tackle the challenges your business faces every day.