Diving into some common, but sometimes overlooked, AWS Cognito misconfigurations.See more
Cisco information disclosure vulnerability leveraging supposedly removed legacy functionalitySee more
Method to leak matching Scroll-to-Text Fragments that will power the xsleaks collection as well as CSS exfiltration techniques.See more
Stealthier code execution and direct system callsSee more
Automating CIS Checks on AWS and performing suggestions on issue groupsSee more
CLI injection vulnerability that was discovered during a penetration test against VMware Cloud Director.See more
This article will present a new tool called NimWhispers based on the work of SysWhispers2 for using syscalls in the Nim programming language.See more
Please try again later.