AT&T data breach: What happened and how to protect your organization

What happens when your phone provider is hacked? That’s what AT&T customers are facing. Learn how to keep yourself and your organization safe.

Bypassing pointer authentication: Understanding the 2024 iPhone attack

A warning was issued about a recent iPhone vulnerability that could bypass pointer authentication. Learn about vulnerability and how it affects you.

The most popular binary exploitation techniques

Binary exploitation and techniques during stack exploitation.

Roadmap for performing an Active Directory assessment

Active Directory (AD) networks are insecure by default. Learn how you can perform an Active Directory assessment to identify and secure any weaknesses.

The importance of asset visibility in the detection and remediation of vulnerabilities

Find out why CISA mandated vulnerability scanning and the role asset visibility plays in ensuring that security threats are detected. 

Digium Phones Under Attack and how web shells can be really dangerous

Learn about the dangers web shells have on Digium phones.

vSingle is abusing GitHub to communicate with the C2 server

Lazarus' advanced persistent threat (APT) operations use malware specially crafted for attacking financial institutions, espionage, and disruptive purposes.

The most dangerous vulnerabilities exploited in 2022

This article will spotlight some of the most dangerous vulnerabilities that threat actors exploited in the first half of 2022.

Follina — Microsoft Office code execution vulnerability

Microsoft tracked as CVE-2022-30190 a new vulnerability, also called “Follina,” that leverages Microsoft Office to lure victims and execute code without thei

Spring4Shell vulnerability details and mitigations

Spring4Shell is a remote code execution vulnerability (CVSS 9.8) published at the end of March 2022 that impacts Spring Framework.