iOS Instrumentation using Corellium, frida and r2frida

Introduction In this blog post we will discuss the use of Corellium emulator in engagements. This blog post will also provide a walktrough on how to bypass Jailbroken detection...

Basic knowledge to get started with Penetration Testing

Before jumping into the basic resources that a pentester should be familiar with, we first need to have an overview on what Penetration Testing actually is. As most online resources will mention,...

Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228)

Introduction This article presents a widespread critical issue that affects many Java applications. Specifically, as per CVE-2021-44228, Apache Log4j2 JNDI features used in configuration, log...

EU GDPR vs Virginia CDPA

This blogpost will try to provide a comparison guide concerning the EU General Data Protection Regulation and the Virginia Consumer Data Protection Act. On the 2nd of March, 2021, the Virginia...

Data protection around the world – Part II

As we have already mentioned in our previous blog post, data protection is among the global leading trends. So, let's expand our and check out what other data protection regulations are...