Documenting our journey towards Zero Trust at Kudelski Security by leveraging Cloudflare Access & HAproxy

Documenting our journey towards Zero Trust at Kudelski Security by leveraging Cloudflare Access & HAproxy
Kubernetes is one of the most used container orchestration frameworks for people building, deploying and managing scalable micro-services. I won’t explain how it works since
Summary The Cyber Fusion Center has learned of malicious, seemly automated, exploitation of recent Cisco IOS and Cisco IOS XE critical vulnerabilities (CVE-2018-0171 & CVE-2018-0156)
Scannerl is our de facto tool to perform large-scale fingerprinting campaigns. It was recently open-sourced on github and is freely available here. We are releasing
This blog post is a walk-through on the implementation of a fingerprinting module for scannerl to identify the version of MySQL running on remote servers.
Introduction In the previous articles (ZigBee Security: Basics (Parts 1 & 2)) provided a brief overview of the ZigBee protocol and its security features. ZigBee