Blog
Linux Kernel Privilege Escalation Vulnerability (CVE-2024-1086) Alert
NSFOCUS CERT has detected that details and a proof-of-concept (PoC) tool for a Linux kernel privilege escalation vulnerability CVE-2024-1086, have been publicly disclosed recently. Due to a use-after-free vulnerability in the netfilter: ...
The Importance of User Roles and Permissions in Cybersecurity Software
How many people would you trust with your house keys? Chances are, you have a ...
Android Supply Chain Validation Cheat Sheet
Several different tools and techniques are available for Android to enumerate software and configurations, allowing you to begin to validate the software on devices. This cheat sheet is based on the work ...
Cyber Risk Management: A Beginner’s Guide
With the emergence of new cybersecurity regulations like the SEC’s incident disclosure rules and the EU’s NIS2 Directive, much attention is directed towards understanding and complying with these new incident reporting requirements ...
Votiro Listed in 2024 Partner Program Guide by CRN®
The post Votiro Listed in 2024 Partner Program Guide by CRN® appeared first on Votiro ...
SCCM Exploitation: Account Compromise Through Automatic Client Push & AD System Discovery
Author: Marshall Price, Senior Security Consultant TL;DR: The following conditions can lead to compromise of the SCCM client push account […] ...
8 Best Compliance Automation Tools: How to Choose
What is Compliance Automation? Compliance automation is like finding an underground tunnel through a (literal) mountain of paperwork and manual processes. Suddenly, the daunting task of aligning processes with requirements and preparing ...
BITTER APT Targets Chinese Government Agency
On February 1, 2024, the APT Group BITTER launched a spear-phishing attack on a Chinese government agency. BITTER, also known as APT-C-08 or T-APT-17, has been actively targeting countries such as China ...
What Are Conversation Overflow Cyberattacks and How Do They Work?
AI has been instrumental in the fight against cybercrime. Machine learning algorithms are far more ...
Ransomware in Context: 2024, A Year of Tumultuous Change
2024 has started off dramatic shifts in the ransomware landscape. In December of 2023 international law enforcement took down the BlackCat leaks site, leading to the group removing all ethical restrictions for ...