Rethinking “Zero-Trust” in Cybersecurity: Why Trust Still Matters In the realm of cybersecurity, the term “zero-trust” has gained considerable traction in recent years. It suggests a paradigm shift away...
What OT security is all about OT security this, OT security that… a lot of technology vendors are hitting this nail and promising all sorts of things. But they...
What do data diodes and “Zone 30” have in common? What is a data diode? A data diode, also sometimes called one-way or unidirectional technology, is a powerful security...
This NIS2 Directive: what is that? Is that something for me? I receive a lot of questions from customers and prospects about the NIS2 Directive. That’s why I decided...
How Spinae Was Able To Take Over Thousands Of Websites Dear security enthusiasts, In this article we will discus how Spinae was able to identify and exploit an...
Vulnerability found in Virtual Reception Kiosk We are proud to announce that the vulnerability CVE-2023-25289, discovered by security researchers from Spinae, has been recognized. Virtual Reception Kiosk During a Pentest...
Are Passwords a Thing of the Future? Or a Thing of the Past? Passwords have been used for a very long time. Nowadays we use them in our digital...
Evaluate and enhance your SME’s cybersecurity ENISA, the European Union Agency for Cybersecurity does a tremendous effort to increase the cybersecurity and cyber resilience in the European Union. One...
PLC security: keep it in running mode. Systems in the factory, such as PLCs, are being connected to the network more often. This opens new opportunities for data visualisation,...
Sometimes you leak important data without knowing it. One of the services Spinae provides for customers is a “Security MRI”. During a Security MRI we search for vulnerabilities in...