All categories
Atos Security Dive Blogs
Categories

Apr 23, 2026
- Advisories
DLL Hijacking in EfficientLab Controlio (cloud-based employee monitoring service)

Apr 22, 2026
- Security Research
Ethical Boundaries of Independent Security Research in the Consumer Pet Tracking Ecosystem

Apr 21, 2026
- Advisories
Broken Access Control in Config Endpoint in LiteLLM

Apr 17, 2026
- Vulnerabilities
Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective

Apr 15, 2026
- Advisories
Exposed Private Key of X.509 Certificate in SAP HANA Cockpit & SAP HANA Database Explorer

Apr 14, 2026
- Advisories
Improper Enforcement of Locked Accounts in WebUI (SSO) in Kiuwan SAST on-premise (KOP) & cloud/SaaS

Apr 14, 2026
- Cyber threats
EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

Apr 1, 2026
- Advisories
Broken Access Control in Open WebUI

Mar 30, 2026
- Cyber threats
Anatomy of access: Windows device objects from a security perspective

Mar 26, 2026
- Cyber threats
The Invisible Danger of Exposed QR Codes and Account Recovery Artifacts

Mar 23, 2026
- Advisories
Local Privilege Escalation in Vienna Assistant (MacOS) - Vienna Symphonic Library

Mar 18, 2026
- Advisories
Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

Mar 17, 2026
- Advisories
Multiple vulnerabilities in PEGA Infinity platform

Mar 6, 2026
- Cyber threats
Investigating a new Click-fix variant

Mar 8, 2024
- Cyber threats
Distributed Denial of 2023?

Feb 19, 2024
- Cyber threats
Domain Spoofing

Feb 9, 2024
- Cyber threats
Writeup Drive Hackthebox

Jan 23, 2024
- Vulnerabilities
Analysis of Ivanti 0-days, CVE-2023-46805 and CVE-2024-21887

Jan 10, 2024
- Cyber threats
From zero to certificate hero. The 5 Steps to a mature Certificate Lifecycle Management

Oct 27, 2023
- Vulnerabilities
Citrix NetScaler flaw exposing sensitive data

Oct 24, 2023
- Vulnerabilities
Using EDR telemetry for offensive research

Sep 12, 2023
- Vulnerabilities
Downfall Vulnerability (CVE-2022-40982)

Jul 3, 2023
- Vulnerabilities
Roaming and racing to get SYSTEM – CVE-2023-37250

Jun 20, 2023
- Incident response
Outlaw APT group - From initial access to crypto mining

Jun 15, 2023
- Cyber threats
Insider Threat – What if the Big Bad Wolf was already in?

Jun 6, 2023
- Cyber threats
CA/Browser Forum S/MIME Certificate Requirements, what is it and what to do about it?

Jun 2, 2023
- Vulnerabilities
Detailed analysis of the Zero- Day vulnerability in MOVEit transfer

May 17, 2023
- Cyber threats
Snake Malware

Apr 28, 2023
- Incident response
BumbleBee hunting with a Velociraptor

Apr 4, 2023
- Cyber threats
Cl0p Ransomware Group activity related to data leaks from GoAnywhere MFT

Mar 31, 2023
- Vulnerabilities
Creating persistent local privilege escalation with temporarily elevated legitimate installers

Mar 21, 2023
- Incident response
SOCCRATES – Automation and Orchestration of Security Operations

Mar 1, 2023
- Cyber threats
Are privacy-enhancing technologies the holy grail to privacy?

Feb 15, 2023
- Incident response
How to build an agile SOC?

Feb 8, 2023
- Incident response
AI-based detections in SOC

Jan 18, 2023
- Vulnerabilities
Attacking local self-protection mechanisms – a case study of CVE-2019-3613 and CVE-2022-3859

Jan 3, 2023
- Incident response
CISO’s perspectives - The 4 recommendations to sleep without a worry

Dec 14, 2022
- Cyber threats