Tarlogic

Cybersecurity experts

2025-06-18

πŸ† A few days ago, AndrΓ©s TarascΓ³ received the 2025 ISACA Madrid Award for Cybersecurity Entrepreneurship. An award for him and his brother Miguel, the founders of @Tarlogic, but above all, for everyone who is or has been part of the company at any point.

This award is yours. All of yours ❀️

tarlogic.com/news/andres-and-m

2025-06-11

What is the probability that a vulnerability has already been exploited? This is what the LEV indicator, designed by NIST to help companies prioritize the mitigation of vulnerabilities affecting their assets, measures πŸ‘‡πŸΌ
tarlogic.com/blog/lev-nist/

2025-06-10

πŸ‘€ Threat detected? Slipper deployed.

In cybersecurity, just like at mom’s house:
If it moves funny, it gets neutralized before it hits the floor. πŸ©΄πŸ’¨

#threathunting

2025-06-05

πŸ” Why is it critical to integrate security into web application development?

⚠️ What are the consequences of not doing so?

🧩 How can you implement a DevSecOps strategy? πŸ‘‡πŸΌ

tarlogic.com/blog/how-to-integ

2025-06-03

🌍 @Tarlogic is at @money2020 Amsterdam today as an exhibitor!

Jessica Cohen and Alessandro Lepre are showcasing our commitment to a safer financial future to the key players of the #Fintech ecosystem, thanks to the support of ICEX πŸ’₯πŸ”

2025-05-29

πŸ’Ά How can sophisticated and difficult-to-detect bank fraud be combated? Cyber intelligence experts play a crucial role in understanding criminals' TTPs and optimizing detection mechanisms.
tarlogic.com/blog/cyber-intell

2025-05-27

🚨 Windows Server 2025 is affected by a vulnerability that would allow attackers to escalate to domain administrator privileges. The S.T.A².R.S Team at @Tarlogic explains how #BadSuccessor is exploited and how to mitigate it.
tarlogic.com/blog/badsuccessor/

2025-05-22

πŸ’£ Β£300 million and almost three months to get back to normal. This week, the cost of the cyberattack suffered by M&S, a leading British retail company, has been revealed. How can retail companies prevent serious incidents?
tarlogic.com/blog/cyberattacks

2025-05-19

We at @Tarlogic have discovered, using our #BSAM guide, the high impact CVE-2024-58101, according to MITRE, which allows the pairing of Samsung Galaxy Buds and Buds 2 devices without users' consent.
tarlogic.com/blog/cve-2024-581

2025-05-08

πŸ€” What are the differences between SAST, DAST, and SCA? Why is it important to combine all of them when detecting vulnerabilities in software?
tarlogic.com/blog/sast-dast-sc

2025-04-30

🚨 A critical and easily exploitable vulnerability allows remote code execution on the Erlang/OTP SSH server. The S.T.A².R.S Unit at @Tarlogic explains how to detect and mitigate this vulnerability and the exploitation process.
tarlogic.com/blog/cve-2025-324

2025-04-24

πŸŸ₯ Joint liability for infringements and even temporary suspension from their duties. This is what executives of companies that do not comply with the obligations of the future Cybersecurity Law are exposed to πŸ‘‡πŸΌ
tarlogic.com/blog/obligations-

2025-04-15

⛓️ Vulnerabilities in smart contracts, attacks on consensus mechanisms or the network, deficiencies in key management... Blockchain Pentesting services help companies face the threats to this technology.
tarlogic.com/blog/blockchain-p

2025-04-10

πŸ’» Preventing vulnerabilities in web code and ensuring that it is secure by design. These are two of the benefits of conducting a web source code audit. What are the others? πŸ˜‰
tarlogic.com/blog/website-sour

2025-04-04

First it was BleSpammer. Now it's VSC Enumerator. The @Tarlogic Innovation team has just released a new PoC that allows to discover hidden commands in Bluetooth adapters.

In this GitHub link you have all the info πŸ‘‡
github.com/TarlogicSecurity/Bl

2025-04-02

A cyberattack can leave us without πŸ₯– bread, πŸ§€ cheese or 🍺 beer. A serious security incident can affect the business continuity of a food company. How can they be prevented, detected and resolved so that they do not cause substantial losses?
tarlogic.com/blog/cybersecurit

2025-03-31

🚨 Five vulnerabilities affecting Kubernetes' Ingress NGINX Controller would allow remote attackers to execute commands without authenticating. The S.T.A².R.S Team at @Tarlogic explains how to mitigate them to prevent exploitation.
tarlogic.com/blog/ingressnight

2025-03-28

BleSpammer is the name of the new PoC that allows you to saturate the screens of mobile phones, tablets or computers by generating an infinite number of pop-ups like the ones that appear when you want to pair wireless headphones.

All the info on GitHubπŸ‘‡

github.com/TarlogicSecurity/Bl

2025-03-27

πŸ›œ Disconnection from the internet, paralysis of activity and substantial economic losses. Cyberattacks against routers in industries and companies can seriously affect companies. We review the main trends surrounding this threat πŸ‘‡πŸΌ
tarlogic.com/blog/cyberattacks

2025-03-20

We continue to publish more technical information on the ESP32 HCI commands πŸ‘‡

tarlogic.com/blog/esp32-hidden

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst