top of page
Jan 224 min read
Think You’re Ready for DORA? Think Again!
As the January 17, 2025 deadline for the Digital Operational Resilience Act (DORA) has passed, financial institutions across the EU are...
Nov 6, 20243 min read
Navigating DORA Compliance for Insurance Firms: An Introduction
The Digital Operational Resilience Act (DORA) represents a turning point in Europe’s approach to digital operational security, and its...
Aug 2, 20242 min read
Digital Operational Resilience Act Series: Article 26 and 27 - Pen testing and Red Teaming
The final tranche of Regulatory Technical Standards (RTS) for the Digital Operational Resilience Act (DORA) have been published last...
Jul 10, 20242 min read
Digital Operational Resilience Act Series: Regulator Reactions and Information so far.
With the final set of Regulatory Technical Standards (RTS’s) being released on July 17th, 2024, there has not been an overly prescriptive...
Jul 2, 20242 min read
Digital Operational Resilience Act Series: Article 25 - I have to test, what now?
Article 25 - Testing of ICT tools and systems One of the five pillars of the Digital Operational Resilience Act (DORA), is the Digital...
Jun 21, 20245 min read
Validate CVE-2024-30078: Windows WiFi Remote Code Execution
On June 11th, Microsoft released hotfixes for CVE-2024-30078 labeled as "Windows Wi-Fi Driver Remote Code Execution Vulnerability". This...
May 6, 20244 min read
When "Phish-Proof" Gets Hooked
In the digital age, the escalation of phishing attacks has pushed the envelope on the development of more robust security measures....
Jun 9, 20233 min read
Beacon-on-Demand: Abusing push notifications for persistence
Abusing push notifications on Windows to gain persistence and launch beacons on demand.
May 22, 20233 min read
Introducing SMShell: Staying covert using SMS based implant
During OffensiveCon 2023, Markus Vervier, founder/director of PSI, presented his research on security aspects of embedded SIM cards...
Mar 29, 20234 min read
AiTM vs Two-Factor Authentication (2FA) mechanisms
In this blog post, we will delve into the impact of this novel phishing approach on most two-factor authentication (2FA) mechanisms and high
Mar 17, 20237 min read
AiTM (Adversary-in-the-Middle) Phishing
As more and more people rely on digital communication for their everyday lives, the threat of cyber-attacks becomes increasingly significant
Blog
News & Resources
Subscribe to keep updated about the latest product features, technology news and resources.
Want to learn more about how Nemesis can help you?
Fill in the form and we will contact you shortly or you can always reach us out via:
bottom of page