Explore the world
of Cybersecurity

  • Application security - EU Directives

    NIS2 Directive: A Step Forward in the EU’s Cybersecurity Strategy

    With the NIS2 directive, the European Union takes a step forward in defining its cybersecurity strategy, aiming to strengthen the security of networks and information systems across all member states.

  • Vulnerability research

    64 bytes and a ROP chain – A journey through nftables – Part 2

    In my previous blog post, we discussed the vulnerability research and validation process. Now, let's get to the exploitation of a stack overflow in the interrupt context by dividing it into two main parts: defeating KASLR and privilege escalation.

Discover how we can help you

Together, we’ll find the best solutions to tackle the challenges your business faces every day.