top of page
Work Overview
LATEST PROJECTS
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque

Blog
Search


Understanding ManageEngine Vulnerability CVE-2022-47966
ManageEngine's CVE-2022-47966 vulnerability is a critical issue that allows an attacker to gain remote code execution on the server...
2 min read


Citrix CVE-2022-27518
Citrix is a global leader in providing digital workspace solutions, and as such, it is a popular target for cyber attackers. One such...
3 min read


Citrix CVE-2022-27516
CVE-2022-27516 is a severe vulnerability recently discovered in Citrix, a widely-used software program. This vulnerability has the...
2 min read


Fortinet CVE-2022-42475
CVE-2022-42475 is a recently discovered vulnerability in the software that powers Fortinet, a popular cybersecurity company. This...
2 min read


Microsoft Office - Arbitrary Code Execution
We have recently observed threat actors evolving their procedures in light of Microsoft disabling macros by default in office documents....
3 min read


CVE-2022-1388 (F5 BIG-IP)
CVE-2022-1388 is a critical CVE (CVSS 9.8) in F5 Networks’ BIG-IP solution management interface. This CVE will allow threat actors to...
3 min read


Spring4Shell
A critical vulnerability CVE-2022-22965 (Spring4Shell or SpringShell) was found on March 29, 2022, in an open-source Java framework while...
3 min read


RPC Vulnerability (CVE-2022-26809)
On patch Tuesday, April 12, 2022, Microsoft released patches for CVE-2022-26809. A vulnerability that is a zero-click exploit targeting...
2 min read


Cyberattacks On The Rise
As we look across the landscape, we see that cyberattacks continue to succeed in all business sectors. In the cases we have observed, the...
1 min read


Attack Surface Management
Considering today's attack surface's massive and hyper-dimensional nature, we begin to see how challenging it is to manage this attack...
3 min read

Benefits of a vCISO
Flexibility: A virtual Chief Information Security Officer (vCISO) can be reached immediately via a simple phone call, whether the vCISO...
3 min read


An Encounter with Pandora
Pandora ransomware came into the spotlight in March of 2022 after posting some high-profile victims on its leak site. The ransomware...
4 min read


What is Incident Response?
Incident response is a method for dealing with various forms of security events, cyber threats, and data breaches in an organized manner....
3 min read


What Is Penetration Testing?
The purpose of penetration testing is to assess an organization's security posture. Penetration testing encompasses all networks,...
3 min read
bottom of page