Leaky Buckets: Misconfigured Public S3 Buckets & Data Leaks
With the simplicity and efficiency that cloud storage offers, it also comes with the risk of misconfigurations which can lead to serious consequences for organizations.
With the simplicity and efficiency that cloud storage offers, it also comes with the risk of misconfigurations which can lead to serious consequences for organizations.
Recently there have been some high-profile campaigns around subdomain hijacking, but what is it exactly?
Earlier today the critical vulnerability CVE-2024-2879 was announced for the widely used WordPress plugin LayerSlider, affecting versions 7.9.11 - 7.10.0....
Given the complexity of obtaining and evaluating data from cloud services, cloud storage forensics is now recognized as a key component of digital investigations in today's digitally-dependent environment. Among them, Google Drive is an excellent choice for forensic investigation because of its extensive usage and the variety of data it...
With the simplicity and efficiency that cloud storage offers, it also comes with the risk of misconfigurations which can lead to serious consequences for organizations.
Given the complexity of obtaining and evaluating data from cloud services, cloud storage forensics is now recognized as a key component of digital investigations in today's digitally-dependent environment. Among them, Google Drive is an excellent choice for forensic investigation because of its extensive usage and the variety of data it...
Recently there have been some high-profile campaigns around subdomain hijacking, but what is it exactly?
Earlier today the critical vulnerability CVE-2024-2879 was announced for the widely used WordPress plugin LayerSlider, affecting versions 7.9.11 - 7.10.0. This vulnerability is an unauthenticated SQL injection with a CVSSv3 score of 9.8 with the likelihood of high impact to data confidentiality and integrity. This post will advise how to...
We are delighted to announce that we have entered into a strategic partnership with KHIPU Networks, with a view to delivering our training to a whole new network of organisations.
CVSS, or Common Vulnerability Scoring System, is a standardized framework used to assess and communicate the severity of software vulnerabilities. It provides a numerical score representing the vulnerability’s potential impact, helping security professionals and organizations prioritize their responses to different security threats.