PinnedJeroen VerhaegheinSystem WeaknessAdvanced Directory Traversal attacks and remediation against windowsDifferent advanced attacks against windowsAug 4, 2023Aug 4, 2023
Jeroen VerhaegheAttacks and Threats Against Large Language Models (LLMs)How susceptible are AI models to hacking, and what are the primary threats associated with the new AI revolution? Moreover, how can we…May 4May 4
Jeroen VerhaegheKeeping Microsoft Teams always appear onlineMicrosoft Teams is a chat application by Microsoft. When the device is unattended for several seconds a user is set to be not available in…May 1May 1
Jeroen VerhaegheHands-on introduction to OSINTOSINT stands for Open Source Intelligence. It’s the practice of collecting and analyzing information from publicly available sources to…Apr 20Apr 20
Jeroen VerhaegheScan uploaded files for malware in .net coreHow can we validate and verify that upload files aren’t a threat to the system or the users?Apr 7Apr 7
Jeroen VerhaegheHands-on unauthenticated Bluetooth keyboard attack(CVE-2024–0230)In the beginning of 2024 a new Bluetooth exploit was exposed. This exploitation allowed an attacker to attach a keyboard to a device…Mar 6Mar 6
Jeroen VerhaegheMake your application GDPR-compliantGDPR stands for General Data Protection Regulation. It’s a comprehensive data privacy regulation enacted by the European Union (EU) to…Feb 16Feb 16
Jeroen VerhaegheCreating smaller and more secure docker images for .NET coreReduce image size and improve securityFeb 4Feb 4
Jeroen VerhaegheReading smart meters wirelessly with wmbusSmart meters are new digital meters used for utilities and allow the utility company to track the usage from a distance.Jan 28Jan 28