Nov 164 min readApplication Lifecycle Management!By now, everyone would have realised that cybersecurity is a shared responsibility and requires a layered approach to stay as close as possi
Nov 71 min readPassword Spray activity from Chinese Threat ActorsBased on reports from Microsoft Storm-0940 has been seen using compromised routers to route traffic for their password spray attacks.
Oct 272 min readBreaking Down CVE-2024-20329: Vulnerability Impact, Exploitation Risks, and How to Stay SecureCVE-2024-20329 is a critical vulnerability in Cisco Adaptive Security Appliance (ASA) software's SSH service.
Oct 212 min readUNIX CUPS Vulnerability CUPS vulnerability discovered in Unix Printing System, which has garnered attention due to its potential for remote code execution (RCE) on
Oct 176 min readCryptographic Protocols: A Refresher on SSL, TLS, and SecurityHello folks! today, we present a brief refresher on cryptographic protocols to help you brush up on some of the key terms you've likely...
Sep 151 min readCVE 2024-7965 -An OverviewCVE-2024-7965 is the improper Google Chrome browser's implementation of the V8 JavaScript engine.
Sep 51 min readCVE 2024-38063 : A Functional OverviewCVE 2024-38063, a critical Windows vulnerability with a CVSS score of 9.8!
Jul 182 min readSoftware supply chain attacksA software supply chain attack targets the software development process to insert malicious code into legitimate software. This attack...