Blogs

PRTG Network Monitor Privilege Escalation
Background:

Defending Layer 8

Security awareness training is broken.

Unauthenticated Command Injection Vulnerability in VMware NSX SD-WAN by VeloCloud
Exploits for network devices including routers, switches, and firewalls have been around for as long as networking has been a thing. It seems like every week a researcher discloses a new vulnerability or publishes proof of concept (PoC) code online for these types of devices, and that is exactly what is happening in this article.

Fall of Sudo – A Pwnage Collection
Introduction
Finding Linux servers heavily reliant on Sudo rules for daily management tasks is a common occurrence. While not necessarily bad, Sudo rules can quickly become security’s worst nightmare. Before discussing the security implications, let’s first discuss what Sudo is.
Defining Sudo

Finding Enterprise Credentials in Data Breaches

In the age of the breach, it’s a safe assumption that almost every public accou

Spectre and Meltdown: Why No One Should Implicitly Trust Hardware

Everyone should be wary of downloading, installing, or running unknown scripts
