ArtResilia's Blog

Cybersecurity News and Insights
November 14, 2025

New Age of Autonomy: Mapping Portugal’s Digital Sovereignty

The increasing reliance on technology globally has propelled the concept of sovereignty beyond traditional geographic boundaries, making digital sovereignty a crucial national…

Read More…

April 27, 2025

Red Teaming EP3: C2 and Usb Implant

This is the third and last blog post in the series of Red Teaming articles. The first article explains the concept of…

Read More…

March 24, 2025

CVE-2024-44903: SQL Injection Vulnerability in Horizon Information Portal

A serious SQL Injection vulnerability has been identified in the SirsiDynix Horizon Information Portal (IPAC20), affecting multiple versions of the software. This…

Read More…

February 11, 2025

Red Teaming EP2: C2 and Smishing Simulation

This is the second blog post in the series of Red Teaming articles. The first article explains the concept of red teaming…

Read More…

May 20, 2024

NIS 2: Implications and Strategies for European Organizations

The NIS (Directive (EU) 2016/1148) was launched on July 6, 2016 and was the first comprehensive European Union directive on cybersecurity. The…

Read More…

March 19, 2024

GDPR x ISO/IEC 27001 – Joining Synergies

With the high wave of attacks that have been witnessed in recent times, the increased capabilities of malicious actors and the regulations…

Read More…

October 31, 2023

Red Teaming EP1: C2 and Phishing Simulation

This is the first of three articles that will be published concerning social engineering campaigns during red teaming exercises. This one will…

Read More…

October 24, 2023

Demystifying GraphQL Introspection: Risks, Visualization and Analysis

  GraphQL has revolutionized how APIs are designed and consumed, offering flexibility and efficiency in data fetching. One of the key features…

Read More…

October 13, 2023

Streamlining Network Visualization: An In-Depth Guide to Interactive HTML Maps with Minimal Dependencies

In the intricate landscape of modern networking, understanding the intricacies of data transmission paths is pivotal for maintaining robust security and optimal…

Read More…

September 1, 2023

Unmasking Deceptive Tactics: The Abuse of Open Redirects in Phishing Campaigns

The digital landscape is rife with various forms of cyber threats, and phishing remains one of the most prevalent and damaging among…

Read More…