LATEST POSTS

Blog2022-07-29T17:39:53-04:00

Our team researches and documents bleeding-edge security concepts and hacking techniques.
This blog explores these topics and more to keep you informed.

Exploiting Cross-Site Scripting (XSS) Vulnerabilities to Steal Cookies

By |January 24, 2023|Blog|

What are Cookies? While browsing the internet, chances are that you’ve came across pop-ups that ask if you want to allow cookies. Instead of questioning what cookies are, the average user accepts the cookies and ...

Are Your Cybersecurity Investments In Tools and Services Paying Off?

By |January 14, 2022|Blog|

Finding, implementing, and supporting cybersecurity tools and services within an organization can be a daunting task for a company of any size. There is no shortage of cybersecurity tools and services available to address just ...

Why Critical Vulnerabilities Like Log4Shell Will Continue to Surface

By |December 14, 2021|Blog|

What is Log4Shell? Log4Shell is a critical vulnerability that affects the Log4J Java logging library (versions 2.14.0 and earlier) bundled into the Apache logging services. The vulnerability allows remote code execution (RCE) by a malicious ...

Go to Top