Blog

Balwurk > Blog

Bruno Pincho

Unauthenticated username enumeration is possible using the web dashboard login, on huawei's HG8247Q router deployed by a popular Portuguese ISP, through a time-based attack.

João Teixeira

The world is on the brink of a new industrial revolution, in which AI technology and Generative AI solutions are changing the way organizations operate. With the increasing risk of security threats, there is a growing global motivation to establish AI security frameworks and regulations. The EU AI Act introduces a set of new requirements and obligations from developers to users of AI solutions. To ensure the best application security practices, it will become essential to implement Threat Modelling and continuous risk management through offensive security measures.

Alexandre Rodrigues

The article highlights DefectDojo as a vital tool for vulnerability management, streamlining processes for developers, auditors, and managers. It optimizes the vulnerability lifecycle by identifying, mitigating, and reporting flaws effectively. In today’s complex digital environment, organizations struggle with testing code and detecting vulnerabilities. DefectDojo addresses this by enabling dynamic analysis during application execution, enhancing cybersecurity practices.

Alexandre Rodrigues

Mobile applications are vital in daily life, but rising cyber threats put their security and privacy at risk. Read this article to discover the latest challenges in app security, privacy concerns, and compliance issues and explore modern solutions like the “Shift Left Culture” and robust testing methods to safeguard apps in an evolving digital landscape. Dive in to stay informed and protected!

Balwurk

In summary, this article explains two regulations from the European Union, The Digital Operational Resilience Act (DORA) and NIS 2 Directive. DORA focuses on enhancing the digital resilience of financial entities, while the NIS 2 aims to protect critical infrastructures across the EU. Together, NIS 2 and DORA reinforce the EU’s commitment to safeguarding essential services and financial stability.

Balwurk

In summary, this article has the purpose to explain to the reader, the importance of Business Continuity Management (BCM) to ensure resilience. The article starts by explaining what a BCM is and the various concepts that it encompasses. With this context, it will be explained in more detail how a BCP should be implemented, tested and improved.