Blog Entries

31. 03. 2026 Alessandro Taufer DevOps, Kubernetes

Abusing Trust Boundaries between TLS and HTTP

A Simple Reverse Proxy Might Turn out to Be Dangerous Sometimes we inadvertently make assumptions that undermine our infrastructure security. In today’s article I want to share with you one of the most common mistakes that are made when setting up a reverse proxy. As always, real world use cases are the best ones to…

Read More
25. 11. 2024 Mattia Codato CTF Writeups, Events

WP CTF 2024: Another Successful Edition!

The 2024 edition of the WP CTF has ended, and we are thrilled to announce its resounding success! This year, approximately 80 participants formed teams from across Europe, including Greece, Germany, Austria, and the Netherlands. Staying true to tradition, WP CTF 2024 featured a Jeopardy-style competition with diverse categories such as AI, Cryptography, OSINT, Web,…

Read More
03. 09. 2019 Massimo Giaimo Events, Log-SIEM, NetEye, Service Management

NetEye SIEM: The Attacker’s Point of View

In our ethical hacking activities there are three different phases in which we clash with the themes of SIEM: PLANNING – The phase prior to the activity where we define the scope of engagement, be it for a Vulnerability Assessment, a Penetration Test or simulating a real attack CHALLENGE – The activity, corresponding to Vulnerability…

Read More

Archive