Vulnerabilities
Vulnerabilities
The most popular binary exploitation techniques
Binary exploitation and techniques during stack exploitation.
Vulnerabilities
Roadmap for performing an Active Directory assessment
Active Directory (AD) networks are insecure by default. Learn how you can perform an Active Directory assessment to identify and secure any weaknesses.
Vulnerabilities
The importance of asset visibility in the detection and remediation of vulnerabilities
Find out why CISA mandated vulnerability scanning and the role asset visibility plays in ensuring that security threats are detected.
Vulnerabilities
Digium Phones Under Attack and how web shells can be really dangerous
Learn about the dangers web shells have on Digium phones.
Vulnerabilities
vSingle is abusing GitHub to communicate with the C2 server
Lazarus' advanced persistent threat (APT) operations use malware specially crafted for attacking financial institutions, espionage, and disruptive purposes.
Vulnerabilities
The most dangerous vulnerabilities exploited in 2022
This article will spotlight some of the most dangerous vulnerabilities that threat actors exploited in the first half of 2022.
Vulnerabilities
Follina — Microsoft Office code execution vulnerability
Microsoft tracked as CVE-2022-30190 a new vulnerability, also called “Follina,” that leverages Microsoft Office to lure victims and execute code without thei
Vulnerabilities
Spring4Shell vulnerability details and mitigations
Spring4Shell is a remote code execution vulnerability (CVSS 9.8) published at the end of March 2022 that impacts Spring Framework.
Vulnerabilities
How criminals are taking advantage of Log4shell vulnerability
This article will break down the modus operandi of the Log4shell vulnerability
Vulnerabilities
Microsoft Autodiscover protocol leaking credentials: How it works
Explore how the Autodiscover protocol works and why your environment might be insecure and leak passwords to the internet.