On June 22 and 23, 2019, Wavestone CTF team YoloSw4g took part in the qualifications for the Google CTF Finals. During this CTF, Google has provided many unusual challenges. Among them is Flagrom, a challenge halfway between hardware hacking and software…
Category: Sections
A chaque première connexion sur un page web ou une application, la même question est posée : "En poursuivant votre navigation sur ce site, vous acceptez nos CGU et l'utilisation de cookies ?". Lors de leur navigation web ou utilisation…
Introduction La sérialisation consiste à transformer un objet applicatif en un format de données pouvant être restauré ultérieurement. Ce procédé est utilisé pour sauvegarder des objets ou les envoyer dans le cadre de communications. Exemple de sérialisation d'une variable…
Quantum computers have given rise to a raft of hopes and fears. Their computing capabilities could enable us to solve certain problems more quickly than today's computers, including those upon which modern cryptography is based. Does this mean that the…
As we’ve seen in the previous article, a serious consideration of "permissions" (also known as rights, authorizations, roles, and access profiles) should significantly reduce the risk of fraud and human error, and contribute to the company’s compliance with relevant legislation.…
Enterprise Resource Planning (ERP) applications support businesses’ most critical processes and workflows. As such, it carries many inherent risks—the main ones being internal fraud and human error. And statutory auditors, internal controllers, and auditors, are only too well aware of…
Avant l'existence du niveau fonctionnel Windows Server 2003, lorsqu'un utilisateur tentait de s'authentifier à l'aide d'un mot de passe n'étant pas le sien, son nombre de tentative d'authentification échouée (représenté par l'attribut "badPwdCount") se voyait automatiquement incrémentée. Depuis l'introduction du…
According to a Wavestone survey[1], as detailed in the study “protecting privacy in the digital age”, 94% of respondents believe that digital privacy is important and should be protected. This study also demonstrates that e-commerce sites, and even retailers in…
The number of cyber-attacks is increasing at an unprecedented rate with no two being the same. We sat down with Nick Prescot (Senior Manager, UK Cybersecurity practice) to discuss cyber crisis management and some key considerations to help C-level executives prepare for…