Digital Operational Resilience Act – DORA – Part II

Intro Hello and welcome to the second part of our two-part blog post where we take a deep dive into the Digital Operational Resilience Act (DORA). For those of you who join us now, I would advise...

Digital Operational Resilience Act – DORA

Hello, welcome to our deep dive into the Digital Operational Resilience Act (DORA), a pivotal regulatory framework reshaping cybersecurity and operational resilience in the European financial...

The EU NIS 2 Directive

The NIS 2 Directive (Directive (EU) 2022/2555), adopted by the European Parliament and Council on 14 December 2022, marks a significant legislative effort to enhance cybersecurity and resilience...

Domain Admin through a simple Xerox Printer

IntroductionIn this blog post, we will explore the methods to utilize printers as a means to establish an initial foothold within a network, potentially compromising the domain controller and,...

LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl”

During an assessment, we discovered a vulnerability in the LedgerSMB application, a widely-used open-source accounting software tailored for small and mid-size businesses. This vulnerability,...