Latest News & Articles
Unveiling the Tools Behind Object Recognition: A Deep Dive into Deep Learning Equipment
Discover the cutting-edge tools and technologies powering object recognition systems. From sophisticated hardware to advanced software frameworks, learn how these
Looking Back on 10 Cybersecurity Trends of 2023
This list of trends highlights the dynamic and complex nature of cybersecurity we faced in 2023, underscoring the need for
The Role of Blockchain in File Sharing Security
In a digital landscape where the exchange of sensitive information is ubiquitous, the conventional models of centralized file sharing systems
Security Resources
CISA's Known Exploited Vulnerabilities Catalog
Minimize Cybersecurity Risk with the Known Exploited Vulnerabilities (KEV) Catalog
In November 2021 the Cybersecurity and Infrastructure Security Agency (CISA) started the Known Exploited Vulnerabilities (KEV) Catalog and Binding Operational Directive 22-01. The KEV catalog lists only vulnerabilities known to be actively exploited.
KEV Catalog: VMware Spring Cloud Gateway Code Injection Vulnerability (CVE-2022-22947)
Wyatt Dahlenburg found this Expression Language injection vulnerability. Applications using Spring Cloud Gateway are vulnerable to a code injection attack
KEV Catalog: Apache Airflow “Example DAG” Command Injection (CVE-2020-11978)
CVE-2020-11978 is a remote code injection vulnerability related to Apache Airflow versions 1.10.10 and below.
Active Directory Series
Active Directory Series: Introducing AD CS
This post introduces Active Directory Certificate Services (AD CS) and topics like: public key infrastructure (PKI), the Kerberos pre-authentication protocol PKINIT, Certificate Signing Requests (CSR), and templates. This overview provides a baseline for learning AD CS penetration testing.