
Blog Series
exploits

Active Exploitation of High-Severity SLP...
CISA has put a spotlight on a high-severity Service Location Protocol (SLP) vulnerability. CISA has bumped it up to the Known Exploited Vulnerabilities catalog. Why the fuss? Well, there’s evidence...
Moving Beyond CVSS Scores for...
Since 2016, new vulnerabilities reported each year have nearly tripled. With the increasing number of discovered vulnerabilities, organizations need to prioritize which of them need immediate attention. However, the task...
The Dangerous Numbers Behind Supply...
Supply chain attacks have witnessed a staggering surge in recent years, morphing into a formidable threat in the cyber landscape. When businesses are increasingly reliant on third-party software and open-source...
Unveiling How Android Malware Slips...
The Google Cloud security team has recently shed light on a common issue where Android malware slips onto Google Play store. This method is used by hackers to evade the...
Fishy Zero Day...
The Cybersecurity and Infrastructure Security Agency (CISA) maintains a regularly updated list of Known Exploited Vulnerabilities (KEV) in order to provide a better understanding of threats posed by software vulnerabilities...
The Bugs Behind the Vulnerabilities...
Welcome to the final installment of our five-part series looking at code bugs responsible for the vulnerabilities and exploits we try to stay safe from. In this part, we’ll go...
The Bugs Behind the Vulnerabilities...
Welcome to part four of the five-part series where we look at the code bugs that explain the many exploits reported on a regular basis. We’ll be looking at the...
Reduced Time to Exploit Is...
We need an opportunity to achieve our cybersecurity goals. The tighter this window, the harder it becomes to do our cybersecurity jobs. Recent reports stating that the time to exploit...
Cloud Patching Can Prevent A...
There is one vulnerability exploited every 2 hours and attackers can cause significant disruption, downtime, and revenue loss. Before divulging into the cloud patching know-how, it’s imperative to learn about...
The Bugs Behind the Vulnerabilities...
It’s common to hear about new vulnerabilities and exploits, some of which even get fancy names of their own, but sometimes the details of how they appear are buried under...