iOS Instrumentation using Corellium, frida and r2frida
by Xenofon Vassilakopoulos | September 27, 2023 | BLOG | 0 Comments
Introduction In this blog post we will discuss the use of Corellium emulator in penetration testing engagements. This blog post will also provide a walktrough on how to bypass Jailbroken detection...
Basic knowledge to get started with Penetration Testing
by Andrei Grigoras | November 18, 2022 | BLOG | 1 Comment
Before jumping into the basic resources that a pentester should be familiar with, we first need to have an overview on what Penetration Testing actually is. As most online resources will mention,...
Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228)
by Xenofon Vassilakopoulos | January 21, 2022 | BLOG | 0 Comments
Introduction This article presents a widespread critical issue that affects many Java applications. Specifically, as per CVE-2021-44228, Apache Log4j2 JNDI features used in configuration, log...
EU GDPR vs Virginia CDPA
by Ioanna Dima | April 22, 2021 | BLOG | 0 Comments
This blogpost will try to provide a comparison guide concerning the EU General Data Protection Regulation and the Virginia Consumer Data Protection Act. On the 2nd of March, 2021, the Virginia...
Data protection around the world – Part II
by Ioanna Dima | March 31, 2021 | BLOG | 0 Comments
As we have already mentioned in our previous blog post, data protection is among the global leading trends. So, let's expand our research and check out what other data protection regulations are...