BLOG

November 28, 2019

Fuzzing the GuruxDLMS.c library with AFL

Fuzzing - methods of looking for security-related bugs Fuzzing (fuzz testing) is one of the most popular methods of looking for security-related bugs, especially the ones related to memory access (e.g. buffer overflow, use after free). Those are the potentially most dangerous bugs in software written in languages that are compiled to machine code (e.g. C and C++), in worst case scenario allowing the attacker to completely take over the execution of a vulnerable program.

Read more
Smart Buildings – nearly 40 percent of systems attacked by malware

29.10.2019

On 19th September 2019, Kaspersky published a report on cybersecurity threats in Smart Building systems. Four out of ten computers used to manage building systems fell victim to a malware attack in the first half of 2019. Infection attempts most often occurred via the Internet, mobile devices, and e-mails. Building Management Systems (BMS) are specialised computer systems installed in Intelligent Buildings. Their task is to ensure the proper and effective operation of the most crucial building subsystems, including ventilation and elevator management, lighting control, supervision of access control system, CCTV, or fire protection system.

More
Dariusz Fabiszewski – Executive Board Advisor in Seqred

23.10.2019

We are pleased to welcome Dariusz Fabiszewski on board. Dariusz, with his 30 years of experience at the forefront of leading IT companies, will join Seqred’s team as the Executive Board Advisor. He will be responsible for strategic support of business development and expansion to the new markets. Dariusz Fabiszewski has 30 years of experience in managing leading global technology companies. For the last six years, he managed the Polish branch of Cisco Systems.

More
Electroenergetics of the XXI century - the evolution of threats

20.10.2019

Until recently, physical and natural threats were the greatest, if not the only ones, to menace the proper functioning of energy systems. With the advent of smart grids and automated devices, power generation has become a sensitive target for cyber attacks that disrupt the proper functioning of power generation and distribution systems. The year 2010 was particularly difficult for Polish power engineers, as the weather conditions caused icing of power lines, which fell one after the other.

More
CVE-2019-14220: Local arbitrary file read in BlueStacks

30.09.2019

BlueStacks is an Android emulator for Windows and Mac. During our tests, we have identified an arbitrary file read vulnerability that can be used by malicious applications to access the user’s private data. The bug has been reported to the developers, and has been fixed prior to the publication of this advisory. Summary An unprotected method in a bstutils service in BlueStacks 4.120 and below on Mac and 4.110 and below on Winodws allows a local attacker to read the contents of arbitrary files with system privileges.

More
How to use public Wi-Fi safely?

12.09.2019

Free Wi-Fi is a service already available in almost every cafe, restaurant, hotel, station or airport. We like to get something for free, but many users are unaware of the risks involved when using a free and unsecured Wi-Fi network in public places. Here are some tips to avoid the unpleasant consequences of careless use of insecure networks in public places. Avoid connecting to a Wi-Fi network you do not know Let’s make it clear – using your own data package on your phone or computer is the safest way to use the Internet in public places.

More
Network segmentation in protection of industrial control systems

02.09.2019

In recent years, industrial control systems have repeatedly been the victim of cyberattacks. The multidimensional attack on Ukraine’s energy infrastructure deprived of energy of nearly 225,000 users. Can network segmentation help protect against an attack or reduce its effects? Cyber attacks on industrial systems. Is the threat real? Hacker attacks are an increasingly serious problem that can seriously threaten the functioning of factories or power networks. It should be noted that we are talking about specific, effective attacks, and not the incidents themselves.

More
ReVoLTE – an attack exploiting the reuse of the same keystream by vulnerable base stations

24.08.2019

A group of academics from Ruhr University Bochum and New York University Abu Dhabi have presented a new attack called ‘ReVoLTE’, that could let remote attackers break the encryption used by VoLTE voice calls and spy on targeted phone calls. The crux of the problem is that most mobile operators often use the same keystream for two subsequent calls within one radio connection to encrypt the voice data between the phone and the same base station, i.

More
Industrial Network Security Architecture - Asset and Network Management

10.07.2019

It was a period of hard work, but also led to many breakthroughs – we have assembled a team of specialists from various fields of cyber security and built the infrastructure necessary for our work. Our engineers have created laboratories for the purposes of safety testing industrial and building automation. By performing reverse engineering and fuzzing we filed 9 vulnerability reports in the devices of leading manufacturers, with further vulnerabilities currently being reported.

More
Botnet Mirai and largest Internet blackout

08.07.2019

Let’s imagine a zombie army, like those straight from the silver screen – a charging horde that only has one goal. This reference to a Hollywood production can help us later understand the type of threat a botnet poses and how large it could be – an army of computers and other electronic devices turned into zombies. Let’s leave cinema magic behind and come back to real life. We need to go back to October 2016 when, as a result of the largest DDoS attack in history, the Internet was practically switched off throughout the whole East Coast of the US.

More