Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

Via Giosuè Carducci, 21 - Pomigliano d'Arco (Italy)
Paseo Montjuic, número 30 - Barcelona (Spain)

info@hacktivesecurity.com

+39 06 8773 8747

Incident Handling

Lessons from a Blue Team failure

Introduction Effective cybersecurity relies not only on robust defense mechanisms but also on swift and coordinated incident response procedures. However, even well-prepared organizations can suffer critical failures if response protocols are not strictly followed. This article examines a real-world scenario where a Blue Team’s failure to act decisively during an ongoing cyberattack led to significant […]

AI Application Security

CVE-2025-25362: Old Vulnerabilities, New Victims – Breaking LLM Prompts with SSTI

TL;DR A Server-Side Template Injection (SSTI) vulnerability in spacy-llm <= v0.7.2 allows attackers to execute arbitrary code via injecting a crafted payload into the template field. Update spacy-llm to version v0.7.3 or later. What is spaCy spaCy is an open-source software library for advanced natural language processing (NLP), written in the programming languages Python and […]

Mobile

Android Deep Dive: Implicit Intents

Introduction From the official Android documentation, the Intent is described as “an abstract description of an operation to be performed”. Conceptually, it can be simplified as an “intention to do something with another application” across Inter-Process Communication (IPC). One of the most interesting facility that intents offer is the implicit resolution. An application can explicitly […]

OPSEC

Introduction to OPSEC (Part 1)

Preface. In today’s interconnected world, operational security (OPSEC) is of greater importance than ever before. OPSEC, a process traditionally associated with military and intelligence operations, has evolved into a critical component of digital security, privacy, and personal safety. However, the understanding and implementation of OPSEC procedures are often fragmented, despite its widespread usage across industries […]

GRC Red Teaming

Evolvere con DORA TLPT: dalla conoscenza all’applicazione

PREMESSA Il 27 dicembre 2022 è stato pubblicato sulla Gazzetta Ufficiale dell’Unione Europea il Digital Operational Resilience Act (DORA), Regolamento 2022/2554, con l’obiettivo di stabilire misure e controlli per migliorare la resilienza del settore finanziario. Il Regolamento ha definito ed armonizzato i requisiti di resilienza digitale per tutto il settore finanziario europeo, disciplinando per l’ambito […]

Reverse Engineering

Not All Roads Lead to PWN2OWN: Firmware Reverse Engineering (Part 2)

Introduction In the previous blog post, we have dissected the Lorex 2K IP Camera from an hardware perspective. The main objectives were to obtain an an interactive shell and extract the firmware for further analysis. Although the first point was not achieved due to the target hardening, we were able to extract the firmware. Since we also had […]

Exploitation Internet of Things Reverse Engineering

Not All Roads Lead to PWN2OWN: Hardware Hacking (Part 1)

Introduction Not all stories end with the expected and hoped-for results, and this story is one of them. We’re releasing a three-part series detailing our unsuccessful Pwn2Own 2024 attempt targeting two IP cameras. The contest forces you into a completely different mindset compared to standard security assessment activities. Here, you have only one objective: compromise […]

Receive the latest news

Subscribe To Our Newsletter

Get notified about new articles