How to prepare before you are impacted by a vulnerability to minimize its possible reach, and how to properly fix things afterwards.
A technical deep dive into the Log4j 2 vulnerability, and experiment with a Kubernetes proof of concept.
December 9th, 2021 a critical update was published for Log4j 2. Its massive use has caused a huge impact all over the Internet, but the story start many years before.
On Cyberpunk 2077, when you steal a car, you use a sophisticated gadget and a CVE id appears on its screen. Is this something real in the world of security?
When you start working on cybersecurity, you see references to things like privilege escalation, lateral movement, or exfiltration all the time. What do they exactly mean?
It was about time for me to really have a blog. Or should I say Vlog?
- 1 / 1