SPARK42 | Offensive Security Blog
  • SPARK42
  • SERVICES
  • CONTACT
  • BLOG

Vulnerability

From ISO to DORA: Who Wants You to Hack Yourself—and How Often
Red Teaming

From ISO to DORA: Who Wants You to Hack Yourself—and How Often

Pen tests and red teaming aren’t just best practices—they’re regulatory requirements. This guide breaks down ISO, PCI DSS, DORA, NIS2, and more in one clear table so you know exactly what’s mandatory.
Read More
Richard Mader
Breaking the Chains: Two Ways to Escape a Docker Container
Exploit

Breaking the Chains: Two Ways to Escape a Docker Container

Docker containers offer isolation, but misconfigurations can lead to escapes. Learn how attackers exploit the Docker socket and cgroups to break out.
Read More
Jan Michálek
When Ransomware Targets Critical Systems: Lessons from the Frontlines
Ransomware

When Ransomware Targets Critical Systems: Lessons from the Frontlines

The recent ransomware attack on the Slovak Land Registry reveals the risks to critical systems, turning backups into liabilities and disrupting operations. This blog explores recovery challenges and highlights the role of proactive vulnerability assessment in mitigating future threats.
Read More
Richard Mader Marián Čupka
SPARK42 | Offensive Security Blog © 2025
  • Sign up
Powered by Ghost