Category: Security

Vulnerability scanning is inefficient – there is a better way

Vulnerability management (VM) should reduce risks. In reality, however, it often causes more confusion than good. Most programs are based on the output of vulnerability scanners and compliance checklists, not evidence of exploitable vulnerabilities. As a result, security teams often spend hours poring over unverified findings, dealing with false positives, and struggling to show whether

More...
How to recover encrypted virtual disks?

How to recover encrypted virtual disks?

A couple of months ago we were asked to help with incident response after a ransomware attack that, among other things, encrypted several VMWare machines. Naturally, we wondered if the virtual machine disks could be recovered or at least some data extracted from them without paying a ransom. The very first look at the disk

More...
BSides Prague 2025

BSides Prague 2025

At the end of the week, the relatively new BSides Prague 2025 conference took place. This was the second year, and we must admit that we did not participate in the first year. ( But some of the 2024 lectures are available here: https://www.youtube.com/playlist?list=PLydF1lVc7uqYe7-6k8vP2XEdqYrN36M0C ) The organizers chose an interesting place, many Prague residents have

More...