

Teetje Stark
•
Apr 18, 2024
Insecure defaults often lead to vulnerable implementations. This blog post explores such an insecure default in the Node.js crypto...

Teetje Stark
•
Jul 23, 2023
SVG Security Risks - not just a scalable graphic

Carsten Sandker
•
May 16, 2023
This spotlight covers the Microsoft Configuration Manager (ConfigMgr), also known as SCCM or MECM. Get an intro into the Configuration Manger...

André Tschapeller
•
Apr 26, 2023

Bastian Kanbach
•
Apr 3, 2023
User enumeration in Azure Active Directory environments is an important step in attack simulations. This blog post revisits how user...

Carsten Sandker
•
Aug 3, 2025
