by Evangelos Ganiaris | Dec 16, 2022 |
What is DLL? In Microsoft Windows, much of the functionality of both the operating system (OS) and third-party applications are provided by Dynamic Link Library (DLL) binaries. DLL files are Microsoft’s interpretation of the shared library concept. Instead of shipping...
by Andrei Grigoras | Nov 18, 2022 |
Before jumping into the basic resources that a pentester should be familiar with, we first need to have an overview on what Penetration Testing actually is. As most online resources will mention, pentesting is an exercise where security experts try to identify and...
by Xenofon Vassilakopoulos | Jan 21, 2022 |
Introduction This article presents a widespread critical issue that affects many Java applications. Specifically, as per CVE-2021-44228, Apache Log4j2 JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and...
by Ioanna Dima | Apr 22, 2021 |
This blogpost will try to provide a comparison guide concerning the EU General Data Protection Regulation and the Virginia Consumer Data Protection Act. On the 2nd of March, 2021, the Virginia Governor signed the Consumer Data Protection Act (CDPA) into law. The CDPA...
by Ioanna Dima | Mar 31, 2021 |
As we have already mentioned in our previous blog post, data protection is among the global leading trends. So, let’s expand our research and check out what other data protection regulations are applicable around the world. A global survey which took place in 2019...
by Ioanna Dima | Mar 24, 2021 |
This blogpost will try to provide an overview regarding data protection regulations which are applicable around the world, and additional information on which countries are considered by the EU to ensure an adequate level of data protection. Nowadays, the importance...