Industrial control systems (ICS) made the headlines a few times lately due to their importance in critical infrastructures (power plants, oil, gas, nuclear plants, etc.)
Tag: Security
Container Security
Containers have been around for decades, but their adoption has gained momentum quite recently. A container is a software solution that provides an additional layer
How to defeat Ed25519 and EdDSA using faults
We’ve succesfully conducted a fault attack against EdDSA that allowed us to recover enough secret key material to produce fake signatures for any message in a way a verifier cannot detect.
A perspective on the state of the SSLiverse as of early 2016
tl;dr; Most studies about SSL tend to use SSL information retrieved by DNS domain names. This article provides an overview of the SSLiverse when SSL
Sphinx Moth: Expanding our knowledge of the “Wild Neutron” / “Morpho” APT
The Kudelski Security Cyber Fusion Center together with the KS-CERT has been monitoring and investigating the “Sphinx Moth” threat activity since mid-2014. When Kaspersky and
Knock knock. Who’s there? Not me.
tl;dr; Port scanning the entire IPv4 address space daily for months at a time generates a lot of very juicy data — and more than a