IoT Firmware, what is it and how does it help you hack a router?
English, DutchThis article explores the process of extracting and analyzing firmware from IoT devices, particularly wireless routers.
Join us as we explore the ever-evolving world of cyber threats and arm yourself with knowledge to defend against potential breaches.
Get ConsultationEnglish, DutchThis article explores the process of extracting and analyzing firmware from IoT devices, particularly wireless routers.
English, DutchImplementing coordinated vulnerability disclosure (CVD) programs is critical to NIS2 compliance. Learn strategies to strengthen your cybersecurity efforts here.
English, DutchAs cyberattacks grow, the EU’s NIS2 directive builds on NIS1 to provide more rigorous cybersecurity measures. Learn how to ensure NIS2 compliance with WebSec.
EnglishRemote Code Execution in QuickBox Media Server
EnglishAn online user on the popular internet board '4chan' has claimed to have hacked twitch and has delivered a large file of data for download
EnglishNew CVE numbers for 2021-08
Are you really sure your organization is secure?
At WebSec we help you answer this question by performing advanced security assessments.
Want to know more? Schedule a call with one of our experts.