Latest News & Articles
Unveiling the Tools Behind Object Recognition: A Deep Dive into Deep Learning Equipment
Discover the cutting-edge tools and technologies powering object recognition systems. From sophisticated hardware to advanced software frameworks, learn how these
Looking Back on 10 Cybersecurity Trends of 2023
This list of trends highlights the dynamic and complex nature of cybersecurity we faced in 2023, underscoring the need for
The Role of Blockchain in File Sharing Security
In a digital landscape where the exchange of sensitive information is ubiquitous, the conventional models of centralized file sharing systems
Security Resources
CISA's Known Exploited Vulnerabilities Catalog
Minimize Cybersecurity Risk with the Known Exploited Vulnerabilities (KEV) Catalog
In November 2021 the Cybersecurity and Infrastructure Security Agency (CISA) started the Known Exploited Vulnerabilities (KEV) Catalog and Binding Operational Directive 22-01. The KEV catalog lists only vulnerabilities known to be actively exploited.
“Certifried” Active Directory Privilege Escalation Vulnerability (CVE-2022-26923)
“Certifried” is an Active Directory privilege escalation vulnerability found in AD Certificate Services in May 2022 by Oliver Lyak.
Atlassian Confluence Server and Data Center RCE Vulnerability (CVE-2022-26134)
This critical remote code execution vulnerability was announced in June 2022 and affected both Atlassian Confluence servers and data centers.
Active Directory Series
Active Directory Series: Introducing AD CS
This post introduces Active Directory Certificate Services (AD CS) and topics like: public key infrastructure (PKI), the Kerberos pre-authentication protocol PKINIT, Certificate Signing Requests (CSR), and templates. This overview provides a baseline for learning AD CS penetration testing.
Active Directory Series: “ZeroLogon” Privilege Escalation Vulnerability
In July 2020 a critical privilege escalation vulnerability emerged that affected Active Directory environments: CVE-2020-1472. Nicknamed “ZeroLogon”, the vulnerability was
Active Directory Series: LDAP Reconnaissance
LDAP is a protocol that is targeted by attackers to get more information about Active Directory environments. This post covers
The Importance of Strong Passwords: Best Practices for Online Security
Whether it’s safeguarding personal email accounts, sensitive financial information, or even critical business data, the significance of a robust password
Taking Flight in Construction and Surveying: The Transformative Power of Drones
Drones are revolutionizing the construction and surveying industries, offering enhanced site inspection, accurate mapping, progress tracking, and improved safety. They
From Above: A Comprehensive Guide to Choosing Between In-house or Outsourced Drone Operations
In the rapidly evolving landscape of drone technology, organizations face a pivotal decision: whether to establish an in-house drone program
Unleashing the Power of GenAI: Exploring the Dark Side of Shadow IT in the Age of Artificial Intelligence
GenAI is a groundbreaking AI platform that can revolutionize industries. But, it can also lead to dangerous Shadow IT on
White House Unveils Comprehensive Cybersecurity Implementation Plan
On July 13, 2023, the Biden administration issued the first iteration of its National Cybersecurity Strategy Implementation Plan. Some experts
Cybersecurity In Real Time: Network Tech For Identifying Attacks
An effective cyber defense strategy should not only include preventative measures but also focus on identifying attacks as they happen