ArtResilia's Blog
NIS 2: Implications and Strategies for European Organizations
The NIS (Directive (EU) 2016/1148) was launched on July 6, 2016 and was the first comprehensive European Union directive on cybersecurity. The…
GDPR x ISO/IEC 27001 – Joining Synergies
With the high wave of attacks that have been witnessed in recent times, the increased capabilities of malicious actors and the regulations…
Red Teaming EP1: C2 and Phishing Simulation
This is the first of three articles that will be published concerning social engineering campaigns during red teaming exercises. This one will…
Demystifying GraphQL Introspection: Risks, Visualization and Analysis
GraphQL has revolutionized how APIs are designed and consumed, offering flexibility and efficiency in data fetching. One of the key features…
Streamlining Network Visualization: An In-Depth Guide to Interactive HTML Maps with Minimal Dependencies
In the intricate landscape of modern networking, understanding the intricacies of data transmission paths is pivotal for maintaining robust security and optimal…
Unmasking Deceptive Tactics: The Abuse of Open Redirects in Phishing Campaigns
The digital landscape is rife with various forms of cyber threats, and phishing remains one of the most prevalent and damaging among…
KNX :: Fun[damentals] for researchers
KNX is an open standard for building automation. KNX is the standard name for the formerly known EIB communication protocol. KNX devices…
Secure Networks: (Un)Secure Protocols | EP 1
Networks are fundamental in any organization regardless of the industry they are in. They allow the entire flow of the organization to…
IoT Series (IV): Debugging with GDB & GHIDRA + Zero-day
The last piece in this Internet of Things (IoT) series, which focuses on security issues of IoT systems, is now completed. The…
IoT Series (III): Firmware testing in QEMU
This is the third blog post in our IoT series. In the last post (IoT Series (II): How to build kernel image…