Blog PetitPotam Ataque de retransmisión NTLM: ¿Qué podemos hacer? Por Cesar Soto Hace algunas semanas, una nueva técnica que afecta a Windows salió a… Dreamlab28. julio 2021
Blog Best Practice for Effective Cyber Incident Response By John van Rooyen Although a cyber-attack can be devastating, the vast majority of organisations… Dreamlab26. julio 2021
Blog CySec Stories: How a 100-year old lady helped me decrypt the Costa Rican ID Card By José Garduño Let me share a funny story on how I discovered the key… Dreamlab4. junio 2021
Blog Microsoft Exchange Vulnerability: The Importance of Early Detection By Javier Perez, Suleiman Mahmoud and Sinan Sekerci In recent weeks, we have seen first-hand… Dreamlab13. abril 2021
Blog Phone number recycling, a process that affects the privacy of Facebook accounts By Teresa Alberto, Security Researcher at Dreamlab Technologies Nowadays, for most of us, smartphones have… Dreamlab15. febrero 2021
Blog Abusing exposed Docker Registry APIs By Sheila A. Berta, Head of Research at Dreamlab Technologies Much has been said recently… Dreamlab7. diciembre 2020
Blog Dropbox Escalation of Privileges to SYSTEM on Windows By Teresa Alberto, Security Researcher at Dreamlab Technologies In January of this year we found… Dreamlab17. septiembre 2020
Blog Attacking Biometric Systems with 3D Printing By Yamila Levalle, Security Researcher at Dreamlab Technologies Humans have used features such as face,… Dreamlab31. agosto 2020
Blog Kubernetes Network Policies for Pods and Namespaces Isolation By Sheila A. Berta, Head of Research at Dreamlab Technologies A network policy is a… Dreamlab10. julio 2020
Blog Kubernetes Security Context and Policies By Sheila A. Berta, Head of Research at Dreamlab Technologies The previous articles about Docker… Dreamlab9. julio 2020