Blogs

Blog Image

Vulnerabilities Discovered in CIPAce Enterprise Platform

Versions Tested:
CIPAce Version < 6.80 Build 2016031401
CIPAce Version < 9.1 Build 2019092801

Blog Image

From the Trenches: Relaying Passwords for the Win!

As pentesters and red teamers, we know that it isn’t hard to get user passwords. The real challenge can be getting an elevated user such as Domain Admin (DA) or Enterprise Admin (EA), especially if you want to try bypassing any type of security auditing, such as the addition of a user to a privileged domain group.

Blog Image

Telesploit: Open-Source Remote Vulnerability Assessment & Penetration Testing

Due to current events, your organization is more than likely experiencing disruption resulting from a rush to implement remote work policies, socia

Blog Image

The Best Online Security Courses to Take in Your Downtime

With the daily routines of millions rapidly changing as we settle into a period of social distancing, many are looking for ways to pass the time once their reading lists

Blog Image

Phishing Attacks: Beware of Online Financial Scams

Challenging times bring out the best in people – but also the worst.

Blog Image

CRITICALSTART’s TEAMARES Research Is Aiding Global Fight Against COVID-19

What does a computer virus have in common with the Coronavirus (COVID-19)? Plenty, believe it or not, as technology can be used to help solve both.

Blog Image

Regex Revelry

Regular Expressions (Regex) are used to identify strings that defy simple search terms, which infosec and technology professionals use for things like input validation, sea

Blog Image

State Legislation May Drive Federal Security Compliance Regulations in 2020

State governments are taking the lead in developing cybersecurity regulations as cyberattacks and data breaches continue to skyrocket.

Blog Image

Vulnerability Focus: Exploits Impacting Organizations

No matter how much you think you’ve done to protect your data and systems, common vulnerabilities continue to wreak havoc on enterprises.