Blog Kubernetes API authorization using RBAC (Role-based Access Control) By Sheila A. Berta, Head of Research at Dreamlab Technologies In the previous article we… Dreamlab3. julio 2020
Blog Kubernetes API authentication using TLS Certificates By Sheila A. Berta, Head of Research at Dreamlab Technologies In a Kubernetes cluster, the… Dreamlab3. julio 2020
Blog Dynamic instrumentation with Frida to analyse Mobile Applications By Teresa Alberto, Security Researcher at Dreamlab Technologies When a security assessment on a mobile application… Dreamlab3. julio 2020
Blog Understanding ATT&CK for Industrial Control Systems (Part II) By Yamila Levalle, Security Researcher at Dreamlab Technologies Tactics and Techniques Used in Known ICS Attacks… Dreamlab3. julio 2020
Blog Unauthenticated RCE in Draytek Vigor 2960, 3900 and 300 (CVE-2020-8515) CVE: CVE-2020-8515 DrayTek Vigor enterprise switches, load-balancers, routers and VPN gateway devices are affected by… Dreamlab30. junio 2020
Blog Understanding ATT&CK for Industrial Control Systems (Part I) By Yamila Levalle, Security Researcher at Dreamlab Technologies MITRE introduced the Adversarial Tactics, Techniques, and Common… Dreamlab29. junio 2020
Blog Kernel Capabilities in Docker: A fine-grained Access Control System By Sheila A. Berta, Head of Research at Dreamlab Technologies Kernel capabilities turn the binary… Dreamlab16. junio 2020
Blog User namespace remapping: an advanced feature to protect your Docker environments! By Sheila A. Berta, Head of Research at Dreamlab Technologies Unlike many technologies, Docker is… Dreamlab6. mayo 2020
Blog Dump the Raft logs in Docker Swarm to get secrets and more! By Sheila A. Berta, Head of Research at Dreamlab Technologies When docker installations are running… Dreamlab29. abril 2020
Blog Bypassing Air Gaps in ICS Systems By Yamila Levalle An air gap, air wall or air gapping is a network security… Dreamlab23. abril 2020