Blogs

Blog Image

Defending Layer 8

Security awareness training is broken.

Blog Image

Unauthenticated Command Injection Vulnerability in VMware NSX SD-WAN by VeloCloud

Exploits for network devices including routers, switches, and firewalls have been around for as long as networking has been a thing. It seems like every week a researcher discloses a new vulnerability or publishes proof of concept (PoC) code online for these types of devices, and that is exactly what is happening in this article.

Blog Image

Fall of Sudo – A Pwnage Collection

Introduction

Finding Linux servers heavily reliant on Sudo rules for daily management tasks is a common occurrence. While not necessarily bad, Sudo rules can quickly become security’s worst nightmare. Before discussing the security implications, let’s first discuss what Sudo is.

Defining Sudo

Blog Image

Finding Enterprise Credentials in Data Breaches


In the age of the breach, it’s a safe assumption that almost every public accou

Blog Image

Cryptojacking Attack: Everyone is a Target

An evolution has occurred with the p

Blog Image

Spectre and Meltdown: Why No One Should Implicitly Trust Hardware


Everyone should be wary of downloading, installing, or running unknown scripts

Blog Image

KRACK Attacks!

What’s the

Blog Image

Bluetooth Blues

The proliferation of wireless devices in the world is ast

Blog Image

Security Automation and Orchestration: An Analyst Perspective

Security Automation and Orchestration (SAO) Platforms are the newest players in the security landscape focusing on easing the burden of alert-fatigue.