Skip to content
Certitude Blog
  • Services
    • Security Assessments
    • Security Engineering
    • Security Governance
    • Cyber Response
  • About Us
    • Companies
    • Team
    • History
    • Values
  • Career
  • Research
  • Press
    • de
    • Deutsch

Articles

Categories
  • Career
  • Compliance
  • Conferences
  • Expertise
  • Incident Response
  • Press
  • press Release
  • Security Strategy
  • Technical Analysis
  • Uncategorized
  • Vulnerability Research
A Guide to Embedding Threat Modeling into Risk Management (Part 1)

A Guide to Embedding Threat Modeling into Risk Management (Part 1)

Written by Daniel Agota on 13.12.202213.12.2022

Overview Showing the benefits of threat modeling to management less invested in cyber security topics is notoriously hard as the added value of security, in ...

Read More
Bypassing Web Application Firewalls

Bypassing Web Application Firewalls

Written by Florian Schweitzer on 23.11.202225.11.2022

Web Application Firewalls (WAFs) are the go-to infrastructure components used to hinder attacks against web applications. What is it that WAFs really offer – can they ...

Read More
Certitude @ DeepSec 2022

Certitude @ DeepSec 2022

Written by Marc Nimmerrichter on 21.11.202221.11.2022

Last week, November 17th and 18th, the DeepSec security conference took place in the Renaissance hotel in Vienna. With more than 50 talks and workshops content was ...

Read More
Bypass phishing detections with Google Translate

Bypass phishing detections with Google Translate

Written by Giulian Guran on 01.08.202217.08.2022

A new wave of phishing is currently circulating (a related story from derstandard.at newspaper can be found here). Documents are said to have been sent to you from a ...

Read More
Kubernetes Security @ WeAreDevelopers

Kubernetes Security @ WeAreDevelopers

Written by Marc Nimmerrichter on 08.07.202227.10.2022

The WeAreDevelopers World Congress is considered by many as Europe's flagship event for developers, bringing together an amazing community from software and ...

Read More
Novelties of NIS2

Novelties of NIS2

Written by Alice Rossi on 30.06.202204.07.2022

The Network and Information Security (NIS) Directive is the first EU-wide piece of cybersecurity legislation, whose primary  objective is to achieve a high common ...

Read More
Kubernetes Security @ DeepSec Vienna 2021

Kubernetes Security @ DeepSec Vienna 2021

Written by Anita Lukic on 07.02.202224.02.2022

On 18th and 19th of November 2021, the DeepSec security conference took place in Vienna to bring together the world's most renowned security professionals from ...

Read More
Ransomware Actor May Have Leaked Their Previous Victims

Ransomware Actor May Have Leaked Their Previous Victims

Written by Roman Ferdigg on 12.01.202212.01.2022

Recently we were tasked with investigating a ransomware attack case. We were able to reconstruct the likely attack vector and identify the data that was likely stolen ...

Read More
HTTP Header Injection in Citrix ADC and Citrix Gateway (CVE-2020-8300, CVE-2021-22927)

HTTP Header Injection in Citrix ADC and Citrix Gateway (CVE-2020-8300, CVE-2021-22927)

Written by Wolfgang Ettlinger on 30.11.202130.11.2021

We have discovered a vulnerability in Citrix products (Citrix ADC and Citrix Gateway) that allows an attacker to conduct header injection attacks. This would have ...

Read More
Unpatched Exchange servers distribute phishing links (squirrelwaffle)

Unpatched Exchange servers distribute phishing links (squirrelwaffle)

Written by Peter Wagner on 29.11.202129.11.2021

Beginning of November a customer reached out to us. Internal and external users reported suspicious mails sent from their mail accounts, which included suspicious ...

Read More
The Invisible JavaScript Backdoor

The Invisible JavaScript Backdoor

Written by Wolfgang Ettlinger on 09.11.202119.01.2022

A few months ago we saw a post on the r/programminghorror subreddit: A developer describes the struggle of identifying a syntax error resulting from an invisible ...

Read More
RCE in GridPro Request Management for Windows Azure Pack (CVE-2021-40371)

RCE in GridPro Request Management for Windows Azure Pack (CVE-2021-40371)

Written by Giulian Guran on 21.10.202121.10.2021

We recently discovered a vulnerability in GridPro Request Management versions <=2.0.7905 for Windows Azure Pack by GridPro Software. The vulnerability was ...

Read More
Citrix ADC & Citrix Gateway Vulnerability CVE-2020-8300

Citrix ADC & Citrix Gateway Vulnerability CVE-2020-8300

Written by Wolfgang Ettlinger on 09.06.202130.11.2021

Update: Details regarding this vulnerability can be found here: https://certitude.consulting/blog/en/citrix-header-injection-2/ We have identified an issue in ...

Read More
DP API encryption ineffective in Windows containers: Publicly Available Cryptographic Keys (CVE-2021-1645)

DP API encryption ineffective in Windows containers: Publicly Available Cryptographic Keys (CVE-2021-1645)

Written by Marc Nimmerrichter on 16.03.202118.05.2021

We recently discovered a vulnerability in the DP API key management of Windows containers. This vulnerability was assigned CVE-2021-1645 by Microsoft [1] and ...

Read More
CSRF in JSF 2.0: Predicting CSRF Tokens for Apache MyFaces

CSRF in JSF 2.0: Predicting CSRF Tokens for Apache MyFaces

Written by Wolfgang Ettlinger on 19.02.202118.05.2021

JavaServer Faces (JSF) is a commonly used server-side web framework. Developers appreciate its relative ease of use while security engineers appreciate its ready-made ...

Read More
Cyber Security with the State of Lower Austria and the Chamber of Commerce and Industry

Cyber Security with the State of Lower Austria and the Chamber of Commerce and Industry

Written by Natalie Müller on 11.01.202320.01.2023

Cyber threats to public and private organizations have increased dramatically in recent years. This is probably due to increasing digitization and is therefore already ...

Read More
Kleine Zeitung online, December 20th, 2022

Kleine Zeitung online, December 20th, 2022

Written by Natalie Müller on 20.12.202229.12.2022

Companies and authorities have to upgrade their cybersecurity systems. This article is available in ...

Read More

Posts navigation

Older

Categories

  • Career
  • Compliance
  • Conferences
  • Expertise
  • Incident Response
  • Press
  • press Release
  • Security Strategy
  • Technical Analysis
  • Uncategorized
  • Vulnerability Research

Archives

  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • June 2020
  • March 2020
  • February 2020
  • January 2020
  • November 2019
  • October 2019
  • September 2019

Follow us on Twitter: @certitude_lab & @cert_it_ude

Certitude Blog

Certitude Consulting GmbH

Barichgasse 40-42 1030 Vienna

  • Services
  • About Us
  • Career
  • Privacy statement
  • Legal Notice
  • Imprint
  • Contact
  • LinkedIn

© 2020 Certitude Consulting GmbH