Blog Ethereum Smart Contracts Visualisation Tools: Surya, Solgraph, Slither, Piet, Sol2UML and Sol Function Profiler By Yamila Levalle, Security Researcher at Dreamlab Technologies Visualisation tools are a key part of… Dreamlab2. Mai 2022
Blog Smarts Contracts Security Tools Comparison: MythX, Mythril, Securify v2.0 and Slither By Yamila Levalle, Security Researcher at Dreamlab Technologies Ethereum Smart Contracts Security Tools While the… Dreamlab20. April 2022
Blog Smarts Contracts Security: An overview of vulnerabilities and hacks By Yamila Levalle, Security Researcher at Dreamlab Technologies Blockchain and Web3 vs Web2 A blockchain,… Dreamlab15. Februar 2022
Blog Leveraging dynamic and static analysis to collect key information of native libraries in mobile apps Teresa Alberto, Security Researcher Within the IT security industry, mobile security analysts frequently choose to… Dreamlab23. September 2021
Blog Detecting suspicious *.ch-domains using deep neural networks By Mischa Obrecht We have recently witnessed the advent of artificial intelligence, machine and deep… Dreamlab30. August 2021
Blog Best Practice for Effective Cyber Incident Response By John van Rooyen Although a cyber-attack can be devastating, the vast majority of organisations… Dreamlab26. Juli 2021
Blog CySec Stories: How a 100-year old lady helped me decrypt the Costa Rican ID Card By José Garduño Let me share a funny story on how I discovered the key… Dreamlab4. Juni 2021
Blog Microsoft Exchange Vulnerability: The Importance of Early Detection By Javier Perez, Suleiman Mahmoud and Sinan Sekerci In recent weeks, we have seen first-hand… Dreamlab13. April 2021
Blog Phone number recycling, a process that affects the privacy of Facebook accounts By Teresa Alberto, Security Researcher at Dreamlab Technologies Nowadays, for most of us, smartphones have… Dreamlab15. Februar 2021
Blog Abusing exposed Docker Registry APIs By Sheila A. Berta, Head of Research at Dreamlab Technologies Much has been said recently… Dreamlab7. Dezember 2020