-
Pentesting Blazor web applications with the Crimson Blazor Decoder
Good security testing starts with one question: what is this application actually doing? The Crimson Blazor Decoder answers that for Blazor Server applications in ZAP.
-
When the Cat Walks Past Twice: An Argument for Vibe Coding Security Engineering
An exploration of vibe coding in security engineering — when intuition trumps process and the cat walks past twice.
-
The use of Telnet in the year 2020
In 1969 the groundbreaking RFC 15 was published describing a protocol known as Telnet. Telnet was used for many years to remotely log into systems. One of the amazing things about Telnet is its...
-
The maliciousness of malware
At Crimson Wall we recently performed an interesting malware experiment. We downloaded thousands of malware applications, ran them and documented their behaviour. The results obtained were in some...
-
The password strength illusion
Earlier this year we saw massive password databases released onto the dark web. These databases were more extensive than any of the databases leaked before. In January a password database called...
-
Wireless keyboard problems
Wireless keyboards are often used in office environments due to their convenience. Wireless keystrokes are transmitted by the keyboard to a wireless receiver that feeds the keystrokes to a computer....
-
Accepting attachments from strangers
Ransomware and trojan horses are often delivered to unsuspecting users as e-mail attachments. Once activated, such malware can cause excessive damage on the computer where the malware was activated,...
-
Phishing wars: A tale of hope, with a twist
In modern times phishing is a harsh reality. Phishing has come a long way from the simplistic Nigerian Prince type scams that once filled up our inboxes. Phishing has grown tremendously in...