DICONIUM BLOG
Our latest thoughts & inspiration
Welcome to our blog. A place where we explore the future and explore the most exciting developments in the digital world. We covers topics that move us, inspire us and make us curious. Have fun and be inspired while reading!
  All
  
  
    
    Data & AI
  
    
    Digital Advisory
  
    
    Software engineering, integration & testing
  
    
    Cybersecurity
  
    
    Salesforce
  
    
    Intershop
  
    
    Adobe
  
  
  
      
      
        
          
          
        
      
  
      
      
        
          
          
        
      
  
      
      
        
          
          
        
      
  
      
      
        
          
          
        
      
  
      
      
        
          
          
        
      
  
      
      
        
          
          
        
      
  
      
      
        
          
          
        
      
  
      
      
        
          
          
        
      
  
      
      
        
          
          
        
      
  
 
          
          
            
              Cybersecurity
            
            
          
          
      Digital identity in Europe: What eIDAS 2.0 means for companies
 
          
          
            
              Cybersecurity
            
            
          
          
      Chaining Bugs from Self XSS to Account Takeover
%201%20(2).png?width=713&height=574&name=u1391528844_GenAI_Content_Strategy_--ar_21_--sref_httpss.mj.run_f22dce2e-44b6-4900-9aff-4025a4544f74%20(1)%201%20(2).png) 
          
          
            
              Cybersecurity
            
            
          
          
      Automotive Cybersecurity Regulations and Standards
 
          
          
            
              Cybersecurity
            
            
          
          
      Understanding Shellcode: Key Concepts for Cybersecurity Experts
 
          
          
            
              Cybersecurity
            
            
          
          
      PKI-as-a-service: Streamlining security token generation and signing for ECUs
 
          
          
            
              Cybersecurity
            
            
          
          
      Fief-server Server-Side Template Injection vulnerability
 
          
          
            
              Cybersecurity
            
            
          
          
      Abusing Shared Libraries for Malicious Gains
 
          
          
            
              Cybersecurity
            
            
          
          
      Bare Metal Reversing Foundations: Physical Memory
 
          
          
            
              Cybersecurity
            
            
          
          
      Hunting Bugs in Linux Kernel With KASAN
You have seen 7 items out of 9
Show more