Vulnerabilities

Microsoft Autodiscover protocol leaking credentials: How it works

Explore how the Autodiscover protocol works and why your environment might be insecure and leak passwords to the internet.

How to write a vulnerability report

Find out how to write a good vulnerability report and why it's important to do well.

How to report a security vulnerability to an organization

Finding a bug is rewarding. But what do you do once you've found one?

PrintNightmare CVE vulnerability walkthrough

We explore the local privilege escalation flaw from the Print Spooler service.

Top 30 most exploited software vulnerabilities being used today

Learn more about the 30 exploits most often used in 2020 and 2021.

The real dangers of vulnerable IoT devices

Internet of Things devices pose a very real threat to cybersecurity. And today, they are prevalent in every household.

How criminals leverage a Firefox fake extension to target Gmail accounts

We walk through a specific Firefox extension called FriarFox that targets Gmail accounts of global Tibetan organizations.

How criminals have abused a Microsoft Exchange flaw in the wild

Learn about CVE-2021-26855, a critical vulnerability called ProxyLogon exploited by criminals to get remote code execution on the vulnerable servers.

How to discover open RDP ports with Shodan

You can use Shodan to discover open remote desktop protocol ports on the internet.

Time to patch: Vulnerabilities exploited in under five minutes?

Zero-day vulnerabilities meet social engineering to create fast exploits leaving patching to play catch-up constantly.