Skip to content
  • Home
  • Categories
    • General
    • Network security
    • Conferences and events
    • Crypto
    • Opinions
    • System administration
    • Device security
Kudelski Security Research

Kudelski Security Research

The Latest News from Research at Kudelski Security

  • Home
  • Categories
    • General
    • Network security
    • Conferences and events
    • Crypto
    • Opinions
    • System administration
    • Device security

Tag: Cloud

Six Cloudplug Vulnerabilities Disclosed

October 5, 2020 inf0junki3

In this blog post, we examine six vulnerabilities that we have found in the CloudPlug, a device that collects logs from ICS/SCADA networks and pushes

Continue reading

Code Audit of Boxcryptor

July 3, 2020 Yolan Romailler

  Boxcryptor is a software developed by Secomba GmbH which focuses on protecting files stored on external cloud providers by over-encrypting the files and even

Continue reading

OpenSSH hardening for cloud machine – Two-factor authentication – part 2

January 20, 2014 smaret

I enthusiastically use two-factor authentication whenever possible because static passwords aren’t the best mechanism to mitigate risk… Traditional passwords are vulnerable to social engineering, key-loggers,

Continue reading

OpenSSH hardening for cloud machine – part 1

November 28, 2013 smaret

SSH is often required to access Linux machines that run on the Cloud infrastructure. SSH is perfect to keep confidentiality and integrity of data exchanged between two

Continue reading

Can Amazon Web Services be used as a supercomputer for security attacks

August 14, 2013 rvhpcs

The “Cloud” keyword has become prominent in the news, articles, almost in everything related to IT. Even in a police TV series the secrets of

Continue reading

Search

Categories

Archives

Twitter @KudelskiSec

My Tweets
Blog at WordPress.com.
Cancel