Category: Uncategorized

Dirty Pipe – Privilege Escalation Vulnerability in Linux

Dirty Pipe – Privilege Escalation Vulnerability in Linux

Linux is found to have yet another severe privilege escalation vulnerability (CVE 2022-0847) in kernel version 5.8 and above. This vulnerability is allowed bad actors to execute malicious code that can act as a host to destructive actions like installing backdoors into the system, injecting code into scripts, and even creating unauthorized user profiles. This

Read More
Adopting Zero Trust Model

Adopting Zero Trust Model

From Zero to Hero Employees are not limited to the office building like in the old days. The remote working had effects on literally everything. Organizations today need a comprehensive security strategy to manage the complexities of securing the data. From perimeter-based security to Zero trust architecture, we have come a long way. Let us

Read More
Browser in The Browser – A new near invisible attack

Browser in The Browser – A new near invisible attack

While reading on the different types of phishing attacks, recently I came across an interesting article by mr.d0x. His article explores the type of attack called Browser in the Browser (BITB). It is a novel phishing attack that exploits the user by simulating a browser window within a browser to spoof a legitimate domain. In

Read More
How Attack Vectors Can Harm Your Company

How Attack Vectors Can Harm Your Company

Effects Of Cyber Attacks : In recent years, we’ve likely to hear more about cybersecurity problems affecting all sorts and scales of businesses. This year, remote employment played a big role in the breach and the average cost was USD 1.07 million in which compromised credentials were the most prevalent first attack vector – accounting

Read More