Forgotten Protocol Chronicles: Do Not Underestimate the Installed Base 13 February 2024·1119 words·6 mins by: John Kristoff John Kristoff examines the risk involved in forgotten, yet active protocols hidden in plain sight through two case studies.
Integrity Checking - an Integral Part of Cyber Security 12 July 2022·2293 words·11 mins by: Tomi Koski and Joona Hoikkala A case study in responsible vulnerability disclosure for a man in the middle attack in FreshService inventory management software.