Skip to main content

All categories

 

Atos Security Dive Blogs

Categories
Apr 23, 2026
  • Advisories

DLL Hijacking in EfficientLab Controlio (cloud-based employee monitoring service)

Apr 22, 2026
  • Security Research

Ethical Boundaries of Independent Security Research in the Consumer Pet Tracking Ecosystem

Apr 21, 2026
  • Advisories

Broken Access Control in Config Endpoint in LiteLLM

Apr 17, 2026
  • Vulnerabilities

Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective

Apr 15, 2026
  • Advisories

Exposed Private Key of X.509 Certificate in SAP HANA Cockpit & SAP HANA Database Explorer

Apr 14, 2026
  • Advisories

Improper Enforcement of Locked Accounts in WebUI (SSO) in Kiuwan SAST on-premise (KOP) & cloud/SaaS

Apr 14, 2026
  • Cyber threats

EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

Apr 1, 2026
  • Advisories

Broken Access Control in Open WebUI

Mar 30, 2026
  • Cyber threats

Anatomy of access: Windows device objects from a security perspective

Mar 26, 2026
  • Cyber threats

The Invisible Danger of Exposed QR Codes and Account Recovery Artifacts

Mar 23, 2026
  • Advisories

Local Privilege Escalation in Vienna Assistant (MacOS) - Vienna Symphonic Library

Mar 18, 2026
  • Advisories

Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

Mar 17, 2026
  • Advisories

Multiple vulnerabilities in PEGA Infinity platform

Mar 6, 2026
  • Cyber threats

Investigating a new Click-fix variant

Mar 8, 2024
  • Cyber threats

Distributed Denial of 2023?

Feb 19, 2024
  • Cyber threats

Domain Spoofing

Feb 9, 2024
  • Cyber threats

Writeup Drive Hackthebox

Jan 23, 2024
  • Vulnerabilities

Analysis of Ivanti 0-days, CVE-2023-46805 and CVE-2024-21887

Jan 10, 2024
  • Cyber threats

From zero to certificate hero. The 5 Steps to a mature Certificate Lifecycle Management

Oct 27, 2023
  • Vulnerabilities

Citrix NetScaler flaw exposing sensitive data

Oct 24, 2023
  • Vulnerabilities

Using EDR telemetry for offensive research

Sep 12, 2023
  • Vulnerabilities

Downfall Vulnerability (CVE-2022-40982)

Jul 3, 2023
  • Vulnerabilities

Roaming and racing to get SYSTEM – CVE-2023-37250

Jun 20, 2023
  • Incident response

Outlaw APT group - From initial access to crypto mining

Jun 15, 2023
  • Cyber threats

Insider Threat – What if the Big Bad Wolf was already in?

Jun 6, 2023
  • Cyber threats

CA/Browser Forum S/MIME Certificate Requirements, what is it and what to do about it?

Jun 2, 2023
  • Vulnerabilities

Detailed analysis of the Zero- Day vulnerability in MOVEit transfer

May 17, 2023
  • Cyber threats

Snake Malware

Apr 28, 2023
  • Incident response

BumbleBee hunting with a Velociraptor

Apr 4, 2023
  • Cyber threats

Cl0p Ransomware Group activity related to data leaks from GoAnywhere MFT

Mar 31, 2023
  • Vulnerabilities

Creating persistent local privilege escalation with temporarily elevated legitimate installers

Mar 21, 2023
  • Incident response

SOCCRATES – Automation and Orchestration of Security Operations

Mar 1, 2023
  • Cyber threats

Are privacy-enhancing technologies the holy grail to privacy?

Feb 15, 2023
  • Incident response

How to build an agile SOC?

Feb 8, 2023
  • Incident response

AI-based detections in SOC

Jan 18, 2023
  • Vulnerabilities

Attacking local self-protection mechanisms – a case study of CVE-2019-3613 and CVE-2022-3859

Jan 3, 2023
  • Incident response

CISO’s perspectives - The 4 recommendations to sleep without a worry

Dec 14, 2022
  • Cyber threats

10 security tips to protect your organizations against ransomware