Blog
- Bilal Mohammed
- May 11, 2023
Executive Summary It comes as no surprise that as artificial intelligence (AI) rapidly evolve and becomes more widely...
- Sohaib Saif
- May 4, 2023
Executive Summary In recent years, the internet has become a hub for many activities, ranging from online shopping to...
- Jake Dancey
- April 28, 2023
Executive Summary In April 2023, a surge in the use of an outdated WordPress plugin called Eval PHP was reported by...
- Patryk Machowiak
- April 27, 2023
Executive Summary On the 31st of March at 2:00pm, The Times reporter, Katie Prescott, published an article speculating...
- Cyber Security Associates
- April 19, 2023
In a recent online briefing, SureCloud’s Risk Advisory Senior Director, Craig Moores, sat down with Senior Consultant...
- Cyber Security Associates
- April 11, 2023
Jitsi-Meet Authentication Bypass (CVE-2021-33506) At CSA, one of our most vital services is penetration testing. We...
- Sohaib Saif
- March 30, 2023
Executive Summary During the Covid-19 pandemic, TikTok quickly became one of the most popular social media platforms...
- Alex Babbage
- March 3, 2023
Executive Summary An unidentified threat actor was identified by Menlo Labs using Discord to spread an evasive threat...
- Cyber Security Associates
- February 15, 2023
For some years now, geopolitical conflicts have been as much about bits and bytes as they have boots and bullets. The...
- Cyber Security Associates
- February 15, 2023
What is it? WPwnKit, discovered by the Qualys Research Team, is a local privilege escalation vulnerability affecting a...
- Thomas Hope
- January 30, 2023
Executive Summary One of the most important tasks for an attacker using malware to successfully compromise a target, is...
- Cyber Security Associates
- January 17, 2023
Executive Summary Although the ongoing war between Russia and Ukraine is well known since the invasion in February...
