Search
Categories
Recent Posts
- Threat Hunt of the Month: CVE-2024-37085 Vulnerability in VMware ESXi Hypervisors – Privilege Escalation and Ransomware Risks
- Reverse Engineering Apple’s Proprietary NFC Wallet Protocol
- Proxy Detection: Comparing Detection Services with the Truth
- Hated by Many, Loved by Hackers: Edge’s Role in Staying Undetected
- Key and E: A Pentester’s Tale on How a Photo Opened Real Doors
- The Challenges of Proxy Detection: Addressing Database Aging and Accuracy Issues
- Web Browser Notification Threat More Alarming than Expected
- Understanding the Microsoft Outage BSOD Incident: Navigating Security Challenges with GoSecure