We care about
your security.

Nethemba is a leading Slovak IT security firm specialized in web security, penetration testing, and RFID security audits. Since 2007, we’ve been securing businesses with cutting-edge research and expertise, trusted by companies worldwide.

We care about
your security.

Nethemba is a leading Slovak IT security firm specialized in web security, penetration testing, and RFID security audits. Since 2007, we’ve been securing businesses with cutting-edge research and expertise, trusted by companies worldwide.

BLOG

Discovery of CVE-2022-24833

When on a security audit for a client it was discovered that a key component – the open-source private paste service PrivateBin contained a previously undocumented flaw. Cross-site-scripting is nothing new. I actually feel there must be prehistoric cave paintings and markings somewhere in the world containing some variation of <script>alert(1)</script>. Although XSS payloads embedded […]

Read More

Facebook

Nethemba
Nethemba17 hours ago
Diverzifikácia rizika na "európsky spôsob" - diskriminujeme non-EU dodávateľov a zrazu nam zostane oligopol EÚ firiem 🙂
Komise zákon prezentuje jako obranu proti čínským dodavatelům. Právnická firma Bird & Bird ale v březnové analýze upozornila na paradox: politika „diverzifikace“ v praxi vede k menší diverzitě dodavatelského pole. Vyloučení firem ze třetích zemí koncentruje zakázky u několika velkých evropských hráčů: Bundesdruckerei, Thales, IDEMIA nebo Atos.
https://reporteri.substack.com/p/novy-kyberneticky-zakon-zavira-dvere
Nethemba
Nethemba2 days ago
‘Withdraw Now’—Inside Aave’s Sudden $200M Bad Debt Crisis
A major exploit of KelpDAO's cross-chain bridge has cascaded into Aave, one of DeFi's largest lending protocols.
https://www.forbes.com/sites/digital-assets/2026/04/18/withdraw-now-inside-aaves-sudden-200m-bad-debt-crisis/
Nethemba
Nethemba2 days ago
"We took the specific vulnerabilities Anthropic showcases in their announcement, isolated the relevant code, and ran them through small, cheap, open-weights models. Those models recovered much of the same analysis. Eight out of eight models detected Mythos's flagship FreeBSD exploit, including one with only 3.6 billion active parameters costing $0.11 per million tokens. A 5.1B-active open model recovered the core chain of the 27-year-old OpenBSD bug."
https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jagged-frontier