by Evangelos Ganiaris | Dec 16, 2022 |
What is DLL? In Microsoft Windows, much of the functionality of both the operating system (OS) and third-party applications are provided by Dynamic Link Library (DLL) binaries. DLL files are Microsoft’s interpretation of the shared library concept. Instead of shipping...
by Andrei Grigoras | Nov 18, 2022 |
Before jumping into the basic resources that a pentester should be familiar with, we first need to have an overview on what Penetration Testing actually is. As most online resources will mention, pentesting is an exercise where security experts try to identify and...
by Athan Georgopoulos | Sep 30, 2022 |
As we announced at the Beyond exhibition today, in our effort to contribute at the cybersecurity community we offer in a first come, first served basis a gratis Application Security Assessment for start- ups with a maximum income of €250,000. This is our contribution...
by Xenofon Vassilakopoulos | Jan 21, 2022 |
Introduction This article presents a widespread critical issue that affects many Java applications. Specifically, as per CVE-2021-44228, Apache Log4j2 JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and...
by Yiannis Koukouras | Nov 27, 2020 |
Due to the ongoing Covid-19 pandemic, teleworking has become the norm. Following our previous teleworking tips post, this one aims to help first-comers, both people and organisations to keep safe. It is usually those, who are the prime targets of black hat hackers. In...