Penetration Testing
- Erwin Krazek
- September 16, 2024
Overview In recent July Patch Tuesday Microsoft patched a vulnerability in the Microsoft Kernel driver appid.sys, which...
- Simone Q
- May 30, 2024
Electronic voting or e-vote is the process of casting a vote electronically from a computer phone or tablet.
- Steve Velcev
- May 28, 2024
Have you ever come across a laptop, server or desktop computer that has Full Device Encryption (FDE) and protected by a...
- Lewis Setherton
- August 25, 2023
When we park or store our cars overnight, we often give thought to the valuable items, careful not to leave them in...
- Cyber Security Associates
- August 16, 2023
It’s been a busy first half of the year for the cybersecurity sector. The threat landscape remains increasingly...
- Cyber Security Associates
- July 20, 2023
Pentesting Keycloak – Part 2 This is part 2/2 of “Pentesting Keycloak”, this section will cover:
- Cyber Security Associates
- July 4, 2023
What is Keycloak? Keycloak is an open-source Identity and Access Management (IAM) solution. It allows easy...
- Cyber Security Associates
- April 11, 2023
Jitsi-Meet Authentication Bypass (CVE-2021-33506) At CSA, one of our most vital services is penetration testing. We...
- Cyber Security Associates
- February 15, 2023
What is it? WPwnKit, discovered by the Qualys Research Team, is a local privilege escalation vulnerability affecting a...
- Cyber Security Associates
- April 5, 2022
Simone Q., Principal Security Consultant, took Nick Hayes, Senior Director of Cyber Solutions at SureCloud, through...
- Cyber Security Associates
- December 14, 2021
TL;DR SureCloud identified a stored cross-site scripting vulnerability (XSS) within the Open edX platform < Lilac...
- Cyber Security Associates
- December 9, 2021
TL;DR SureCloud Cyber identified a denial of service (DoS) vulnerability in Akka-http prior to 10.2.6. An Akka-http...