Blog Phone number recycling, a process that affects the privacy of Facebook accounts By Teresa Alberto, Security Researcher at Dreamlab Technologies Nowadays, for most of us, smartphones have… Dreamlab15. February 2021
Blog Abusing exposed Docker Registry APIs By Sheila A. Berta, Head of Research at Dreamlab Technologies Much has been said recently… Dreamlab7. December 2020
Blog Dropbox Escalation of Privileges to SYSTEM on Windows By Teresa Alberto, Security Researcher at Dreamlab Technologies In January of this year we found… Dreamlab17. September 2020
Blog Attacking Biometric Systems with 3D Printing By Yamila Levalle, Security Researcher at Dreamlab Technologies Humans have used features such as face,… Dreamlab31. August 2020
Blog Kubernetes Network Policies for Pods and Namespaces Isolation By Sheila A. Berta, Head of Research at Dreamlab Technologies A network policy is a… Dreamlab10. July 2020
Blog Kubernetes Security Context and Policies By Sheila A. Berta, Head of Research at Dreamlab Technologies The previous articles about Docker… Dreamlab9. July 2020
Blog Kubernetes API authorization using RBAC (Role-based Access Control) By Sheila A. Berta, Head of Research at Dreamlab Technologies In the previous article we… Dreamlab3. July 2020
Blog Kubernetes API authentication using TLS Certificates By Sheila A. Berta, Head of Research at Dreamlab Technologies In a Kubernetes cluster, the… Dreamlab3. July 2020
Blog Dynamic instrumentation with Frida to analyse Mobile Applications By Teresa Alberto, Security Researcher at Dreamlab Technologies When a security assessment on a mobile application… Dreamlab3. July 2020
Blog Understanding ATT&CK for Industrial Control Systems (Part II) By Yamila Levalle, Security Researcher at Dreamlab Technologies Tactics and Techniques Used in Known ICS Attacks… Dreamlab3. July 2020