30 January 2023

2 ways repair shops can hack your mobile phone

While many independently owned repair shops might be completely legitimate operations, there are more and more popping up that can and will hack your mobile phone while repairing it. And the problem is, it’s REALLY easy to do

4 January 2022

Built on Trust: How We Protect Our Ethics at Citadelo

Ethical hacking requires more than just technical skills — it demands trust, responsibility, and a clear set of values. At Citadelo, we’ve built our security services on a foundation of integrity. Here’s how we keep that foundation solid.

14 December 2021

CVE-2021-44228: Why Log4Shell Is Still a Critical Threat

Log4Shell (CVE-2021-44228) is one of the most severe and widespread vulnerabilities in recent memory. This article unpacks the threat, the reasons for its rapid spread, and what every security team needs to know.

30 November 2021

Red Teaming: Would Your Company Survive a Full-Scale Attack?

Pentests are great. But real attackers don’t follow rules or scopes. Red Teaming simulates the chaos of a real cyberattack — testing your systems, staff, and security teams all at once.

29 September 2021

Security Meets Compliance: Citadelo and Binary Confidence Unite

Citadelo has formed a strategic alliance with Binary Confidence to deliver end-to-end cybersecurity consulting — from penetration testing to legal compliance.

29 September 2021

Obfuscated Apps Waste Time. Here’s How to Pentest Smarter

Mobile applications: Why they should always be tested on a build without obfuscation, SSL pinning, and root/jb detection.