With rising digitalization, threats have also gone manifold. Now imagine having a scenario where you can get an idea of an adversary’s moves in advance. In […]
Apache Airflow is an open-source platform for programmatically authoring, scheduling, and monitoring workflows. While it offers robust features for managing complex workflows, it has experienced security […]
A supply chain attack via Polyfill, a common open-source library written in JavaScript, used in web development to provide modern functionality on older browsers like IE7 […]
Apps are everywhere these days. They are ubiquitous tools for organizations to deliver services and run operations. However, this has not not gone unnoticed in the […]
Gray Box Penetration Testing (GBPT) combines the best aspects of both Black Box and White Box testing, providing a balanced approach to security testing. Gray Box […]
White box penetration testing, also known as clear-box testing or transparent-box testing, is a method of testing the security vulnerabilities of a system or application from […]
CVE-2019-8805 is a privilege escalation vulnerability found in macOS Catalina 10.15 by Scott Knight. This vulnerability occurs through the Endpoint Security framework introduced in Catalina 10.15. […]
Penetration testing applications and APIs behind a Web Application Firewall (WAF) requires sophisticated techniques to bypass protective measures. Here is an advanced and detailed methodology from […]