Blogs

Vulnerabilities Discovered in CIPAce Enterprise Platform

Versions Tested:
CIPAce Version < 6.80 Build 2016031401
CIPAce Version < 9.1 Build 2019092801

From the Trenches: Relaying Passwords for the Win!
As pentesters and red teamers, we know that it isn’t hard to get user passwords. The real challenge can be getting an elevated user such as Domain Admin (DA) or Enterprise Admin (EA), especially if you want to try bypassing any type of security auditing, such as the addition of a user to a privileged domain group.

Telesploit: Open-Source Remote Vulnerability Assessment & Penetration Testing

Due to current events, your organization is more than likely experiencing disruption resulting from a rush to implement remote work policies, socia

Authentication Bypass Vulnerability Discovered in Infinias eIDC32 WebServer
Versions Tested:
Web Revision: 1.107, Board: 3.001, Firmware: 2.213

The Best Online Security Courses to Take in Your Downtime

With the daily routines of millions rapidly changing as we settle into a period of social distancing, many are looking for ways to pass the time once their reading lists

Phishing Attacks: Beware of Online Financial Scams

Challenging times bring out the best in people – but also the worst.

CRITICALSTART’s TEAMARES Research Is Aiding Global Fight Against COVID-19
What does a computer virus have in common with the Coronavirus (COVID-19)? Plenty, believe it or not, as technology can be used to help solve both.

Regex Revelry

Regular Expressions (Regex) are used to identify strings that defy simple search terms, which infosec and technology professionals use for things like input validation, sea

Vulnerabilities Discovered in Tiff Server from AquaForest

Versions Tested:
Tiff Server 4.0

State Legislation May Drive Federal Security Compliance Regulations in 2020

State governments are taking the lead in developing cybersecurity regulations as cyberattacks and data breaches continue to skyrocket.

Vulnerability Focus: Exploits Impacting Organizations

No matter how much you think you’ve done to protect your data and systems, common vulnerabilities continue to wreak havoc on enterprises.