9th December 2021 a critical update was published for Log4j 2. Its massive use has caused a huge impact all over the Internet, but the story start many years before.
On Cyberpunk 2077, when you steal a car, you use a sophisticated gadget and a CVE id appears on its screen. Is this something real in the world of security?
When you start working on cybersecurity, you see references to things like privilege escalation, lateral movement, or exfiltration all the time. What do they exactly mean?
It was about time for me to really have a blog. Or should I say Vlog?
- 1 / 1