Author: Karim S., Security Expert, Kudelski IoT Security Last year, Kudelski IoT Security Labs performed several analyses of vehicle theft recovery systems to understand their
Documenting our journey towards Zero Trust at Kudelski Security by leveraging Cloudflare Access & HAproxy
Kubernetes is one of the most used container orchestration frameworks for people building, deploying and managing scalable micro-services. I won’t explain how it works since
Summary The Cyber Fusion Center has learned of malicious, seemly automated, exploitation of recent Cisco IOS and Cisco IOS XE critical vulnerabilities (CVE-2018-0171 & CVE-2018-0156)
Scannerl is our de facto tool to perform large-scale fingerprinting campaigns. It was recently open-sourced on github and is freely available here. We are releasing
This blog post is a walk-through on the implementation of a fingerprinting module for scannerl to identify the version of MySQL running on remote servers.