Dropbox Escalation of Privileges to SYSTEM on Windows
In January of this year we found an EoP (Escalation of Privileges) or LPE (Local Privilege Escalation) in the Dropbox Windows application. The bug was...
In January of this year we found an EoP (Escalation of Privileges) or LPE (Local Privilege Escalation) in the Dropbox Windows application. The bug was...
Humans have used features such as face, voice, and gait for thousands of years to recognize each other, but only recently, humans have started using...
A network policy is a specification of how groups of pods are allowed to communicate with each other and other network endpoints. The Kubernetes...
The previous articles about Docker security have discussed many security features that can be applied at container's runtime. Those features, such as...
In the previous article we talked about authentication in Kubernetes using TLS certificates. Once the user or service account is authenticated, the...
In a Kubernetes cluster, the kube-apiserver is the main component of the Control Plane, all the actions that occur within the cluster go through this...
When a security assessment on a mobile application is being carried out (specifically on Android) there are two main roads an analyst can take: ...
The evidence that ICS systems are a prime target for sophisticated attackers, is clearly shown by...
CVE: CVE-2020-8515
DrayTek Vigor enterprise switches, load-balancers, routers and VPN gateway devices are affected by a remote code execution...
MITRE introduced the Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) in 2013 as a central knowledge base for adversary behaviour. It is...