recent publications

From a Log to the Threat Hunting

Laboratory environment for offensive practices in industrial networks

read
From a Log to the Threat Hunting

Hypotheses in the field of cyber threat detection

read
From a Log to the Threat Hunting

The Shock wave of Data Breaches(The T-Mobile case)

read
Follina a silent Client-Side

Attacking industrial networks (Siemens)

read
From a Log to the Threat Hunting

Understanding industrial networks before attacking them

read
From a Log to the Threat Hunting

From a Log to the Threat Hunting

read
Forgotten Protocols: NTP (Network Time Protocol)

Forgotten Protocols: NTP (Network Time Protocol)

read
Forgotten Protocols: NTP (Network Time Protocol)

Data-flow analysis

read

Trojan detection techniques in hardware implementations

read

NIST Cybersecurity Framework v2.0

read

EEPROM 1-Wire Protected with SHA-1 discovery & Low-Cost Side-Channel Attack

read

Dataflow on servers

read

Cybersecurity in the digital age of healthcare

read

Cybersecurity in the fourth Industrial Revolution (Industry 4.0)

read

Cyber Security guide for gamers

read