Home
The Vlog
Cancel
Log4j 2 vulnerabilities, part III: Prevention, mitigation and fixing

Log4j 2 vulnerabilities, part III: Prevention, mitigation and fixing

How to prepare before you are impacted by a vulnerability to minimize its possible reach, and how to properly fix things afterwards.

Log4j 2 vulnerabilities, part II: Kubernetes POC

Log4j 2 vulnerabilities, part II: Kubernetes POC

A technical deep dive into the Log4j 2 vulnerability, and experiment with a Kubernetes proof of concept.

Log4j 2 vulnerabilities, part I: History

Log4j 2 vulnerabilities, part I: History

December 9th, 2021 a critical update was published for Log4j 2. Its massive use has caused a huge impact all over the Internet, but the story start many years before.

What is a CVE?

What is a CVE?

On Cyberpunk 2077, when you steal a car, you use a sophisticated gadget and a CVE id appears on its screen. Is this something real in the world of security?

Introduction to MITRE ATT&CK

Introduction to MITRE ATT&CK

When you start working on cybersecurity, you see references to things like privilege escalation, lateral movement, or exfiltration all the time. What do they exactly mean?

Hi everybody... welcome to my blog!

Hi everybody... welcome to my blog!

It was about time for me to really have a blog. Or should I say Vlog?