In our previous post, Red Team Finds A Way – Exploiting The Human Factor, we explored how the human element can often be the weakest
AWS vs Azure: A “Secure by default” comparison
Whether you are in charge of deciding what Cloud solution to choose for your organization or you are a Security Professional trying to decide what
An ex psychologist’s journey into Cyber Security
How it all started What if I told you that the machines with 99 percentage fail chance wouldn’t do it… but a human with 1
Red Team Finds A Way – Exploiting The Human Factor
What is Red Teaming? Red Teaming is a comprehensive approach that involves the use of various tactics, techniques, and procedures (TTPs) to simulate real-world threats.
AWS CloudQuarry: Digging for Secrets in Public AMIs
Money, secrets and mass exploitation: This research unveils a quarry of sensitive data stored in public AMIs. Digging through each AMI we managed to collect
CVE-2024-28344 & CVE-2024-28345 in Sipwise C5
Update The vulnerabilities are also present on the latest version of Sipwise C5 mr12.2.1. CVE-2024-28344 – Open Redirect An Open Redirect vulnerability was found in