OUR BLOG
Basic knowledge to get started with Penetration Testing
Before jumping into the basic resources that a pentester should be familiar with, we first need to have an overview on what Penetration Testing actually is. As most online resources will mention, pentesting is an exercise where security experts try to identify and...
Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228)
Introduction This article presents a widespread critical issue that affects many Java applications. Specifically, as per CVE-2021-44228, Apache Log4j2 JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and...
EU GDPR vs Virginia CDPA
This blogpost will try to provide a comparison guide concerning the EU General Data Protection Regulation and the Virginia Consumer Data Protection Act. On the 2nd of March, 2021, the Virginia Governor signed the Consumer Data Protection Act (CDPA) into law. The CDPA...
Data protection around the world – Part II
Data protection around the world
This blogpost will try to provide an overview regarding data protection regulations which are applicable around the world, and additional information on which countries are considered by the EU to ensure an adequate level of data protection. Nowadays, the importance...
The Privacy Shield Frameworks
This blogpost will try to provide an overview regarding the EU-US and Swiss-US Privacy Shield Frameworks. The EU-US and Swiss-US Privacy Shield Frameworks were designed by the US Department of Commerce and the European Commission and Swiss Administration in order for...