Hooking Linux Kernel Functions, Part 1: Looking for the Perfect Solution
Meet the first part of our series dedicated to hooking Linux kernel functions using ftrace. Explore four helpful approaches to use for your solutions...
Meet the first part of our series dedicated to hooking Linux kernel functions using ftrace. Explore four helpful approaches to use for your solutions...
The article provides a close look at the host-based firewall architecture and explains the principles behind host-based firewalls with real-life examp...
This article describes the ways ransomware can infect the cloud and how can you protect your cloud-based systems from such a devastating threat.
Practical tips on how to use LD_PRELOAD with the GCC attribute constructor to preload libraries in the custom order.
In this article, we describe scenarios where we apply Docker to handle continuous integration/continuous development for a Django web service
Is it possible to build a transparent SSL proxy on a regular PC?
This article may be useful for security administrators and DevSecOps who are looking for alternative ways of detecting network intrusions and suspicio...
The article might be useful for SaaS providers and web developers who want to protect their applications against upcoming password guessing attacks ba...
What are MITM attacks and how to protect against them?
Learn about five most popular web application security testing methodologies, including penetration testing.
Tell us about your project
Send us a request for proposal! Weโll get back to you with details and estimations.
Book an Exploratory Call
Do not have any specific task for us in mind but our skills seem interesting?
Get a quick Apriorit intro to better understand our team capabilities.
Book time slotContact us