Auth0Is Instagram More Secure Than the U.S. State Department?On September 18, the U.S. State Department confirmed that one of its email systems was attacked. It didn’t follow up with many details —…Oct 31, 2018Oct 31, 2018
Cedric OwensinRed Teaming with a Blue Team MentalityLow Hanging Fruit Often Abused By Red TeamsYou have heard it said that attackers will take the least path of resistance and first abuse the lowest hanging fruit when gaining a…Oct 31, 2018Oct 31, 2018
Michael DavisCritical vulnerability in Higher Ed ERPCritical vulnerability in a Higher Ed ERP has a trivially exploitable vulnerability that leads to remote web shellOct 30, 2018Oct 30, 2018
Roger GalobardesLearn how easy is to bypass firewalls using DNS tunneling (and also how to block it)See how I played red team/blue team on this simple network security experiment.Oct 30, 20185Oct 30, 20185
Israel Aráoz SevericheWriteup Bounty at HTB (HackTheBox)Este es el primer “writeup” de hackthebox que publico, tengo un par en borrador, pero todavía las maquinas están activas, con una…Oct 29, 20181Oct 29, 20181
XQ CyberMost CyberSecurity tools ‘too complex’ says report -Good job there’s CyberScore™According to a recently published survey by Thycotic, the complexity of cybersecurity tools is impeding their effective deployment and…Oct 29, 2018Oct 29, 2018
AnomaliImporting Intelligence Data Directly From iOS 12One situation I’ll often find myself in is reading a mail, blog post, or bulletin on my phone, such as this detailed analysis blog post…Oct 28, 2018Oct 28, 2018