ArtResilia's Blog
ISO 22301:2019 as a Pillar of Resilience: Bridging Information Security with ISO 27001 and NIS 2 Compliance
We live in a world where organisations no longer operate in predictable, stable environments. Instead, they face multiple risks that can disrupt…
Critical Vectors of Dependence: E-mail, Certificates and CDNs
Technological dependence is not always measured in percentages of hardware. Often, it lies in the control over daily operational tools. To better…
DocMost v0.21.0: CVE-2025-57231 Unauthenticated File Path Traversal
An unauthenticated File Path Traversal vulnerability was detected in the DocMost docker image v0.21.0. At the time of this discovery hundreds of…
5% Barrier: Digital Assets and Foreign Dependency
For Portugal to ensure digital autonomy, and subsequently digital sovereignty, it is essential that the nation is not subject to foreign digital…
Portugal’s (Open Source) Advantage: Software Paradox
The reduction of reliance on foreign entities is crucial for ensuring Portugal’s digital autonomy and security, particularly within strategic technological sectors. Excessive…
New Age of Autonomy: Mapping Portugal’s Digital Sovereignty
The increasing reliance on technology globally has propelled the concept of sovereignty beyond traditional geographic boundaries, making digital sovereignty a crucial national…
Red Teaming EP3: C2 and Usb Implant
This is the third and last blog post in the series of Red Teaming articles. The first article explains the concept of…
CVE-2024-44903: SQL Injection Vulnerability in Horizon Information Portal
A serious SQL Injection vulnerability has been identified in the SirsiDynix Horizon Information Portal (IPAC20), affecting multiple versions of the software. This…
Red Teaming EP2: C2 and Smishing Simulation
This is the second blog post in the series of Red Teaming articles. The first article explains the concept of red teaming…
NIS 2: Implications and Strategies for European Organizations
The NIS (Directive (EU) 2016/1148) was launched on July 6, 2016 and was the first comprehensive European Union directive on cybersecurity. The…