Cybersecurity Report
CVE-2022-40684: Fortinet Authentication Vulnerability That Threatens Fortinet Users
On Oct. 7, 2022, less than a month after the ProxyNotshell attack that used MS Exchange Server Zero-Day vulnerability, Fortinet authentication bypass vulnerability CVE-2022-40684 was discovered. This vulnerability is threatening users [...]
Government Servers Hacked by the Unseen Cryptojackers
Cryptojacking is an illegal method of cryptocurrency mining that operates by infecting third party IT assets with malware. This form of malicious hacker attacks have been more or less a [...]
LockBit 3.0 Ransomware Case Study: A Huge Cybersecurity Risk
In this article, we will analyze Lockbit 3.0 ransomware cases and determine how attacks similar to these cases can be prevented. What is LockBit 3.0 Ransomware? LockBit 3.0 (also known [...]
Cloud Attack Surfaces: Detecting Active AWS Assets Left Unattended
Plenty of vulnerable default welcome pages can be found on a cloud attack surface. Software engineers who understand AWS cloud characteristics or users who have encountered AWS' default welcome pages can [...]
Default welcome page exposure: A Significant Security Risk
Default welcome page exposure describes blank preference web pages left neglected on the attack surface. They are most commonly encountered at the beginning stages of installing and running systems, and [...]
K-Pop Deepfake Porn Sites: Sneaky Criminals Hiding Real IP Address with Cloudflare
Deepfake is an image synthesis technology that utilizes AI. It is a collective term for frame-by-frame synthesis of a person in an existing image or a video with another person's [...]