
Daniel Yepes
How does the SSL fallback's works
In this blog post, we discuss the exploitation of an SSL/TLS flaw that creates a fallback on TLS usage to SSL 3.0.

Daniel Yepes
Understanding the BEAST
How does a theorized attack (the Browser Exploit Attack on SSL/TLS) become practical after more than ten years? Find out in this blog post.

Daniel Yepes
Understanding the flaw behind Heartbleed
Here we talk about Heartbleed, the result of a buggy implementation of the TLS protocol on OpenSSL, which was tempted to be a severe threat to private data.