While reviewing different types of vulnerability scanning tools and services, it became very clear that testing such tools would require at least some known vulnerable applications to be configured. However, doing so may take up a considerable amount of time and effort. We decided to use a collection of pre-configured Docker containers and a Bash script to speed up this process.
If you’ve read cloud migration case studies and presentations at conferences for new cloud migration tools, it would be easy to believe migrating to the cloud is straight-forward, if that were true then why do a third of them fail? Click here to read about the challenges of migrating legacy applications and infrastructure that should not be under-estimated.
The last month has seen a spate of Wi-Fi vulnerabilities. Those that affect the Wi-Fi traffic are bad, but worse are those that allow attacks against the device itself. This blog provides an overview of the recent bugs, and offers some history on Wi-Fi exploitation.