Vulnerabilities July 20, 2022 Pedro Tavares How criminals are taking advantage of Log4shell vulnerability This article will break down the modus operandi of the Log4shell vulnerability
Vulnerabilities April 12, 2022 Lester Obbayi Microsoft Autodiscover protocol leaking credentials: How it works Explore how the Autodiscover protocol works and why your environment might be insecure and leak passwords to the internet.
Vulnerabilities February 1, 2022 Howard Poston How to write a vulnerability report Find out how to write a good vulnerability report and why it's important to do well.
Vulnerabilities January 26, 2022 Howard Poston How to report a security vulnerability to an organization Finding a bug is rewarding. But what do you do once you've found one?
Vulnerabilities November 3, 2021 Pedro Tavares PrintNightmare CVE vulnerability walkthrough We explore the local privilege escalation flaw from the Print Spooler service.
Vulnerabilities October 12, 2021 Kurt Ellzey Top 30 most exploited software vulnerabilities being used today Learn more about the 30 exploits most often used in 2020 and 2021.
Vulnerabilities September 15, 2021 Pedro Tavares The real dangers of vulnerable IoT devices Internet of Things devices pose a very real threat to cybersecurity. And today, they are prevalent in every household.
Vulnerabilities September 14, 2021 Pedro Tavares How criminals leverage a Firefox fake extension to target Gmail accounts We walk through a specific Firefox extension called FriarFox that targets Gmail accounts of global Tibetan organizations.
Vulnerabilities August 11, 2021 Pedro Tavares How criminals have abused a Microsoft Exchange flaw in the wild Learn about CVE-2021-26855, a critical vulnerability called ProxyLogon exploited by criminals to get remote code execution on the vulnerable servers.
Vulnerabilities August 9, 2021 Lester Obbayi How to discover open RDP ports with Shodan You can use Shodan to discover open remote desktop protocol ports on the internet.