Blog
Home / Blog
- Active Directory
- Android
- API
- AWS
- Azure
- Blog
- Cloud
- Container Security
- Desktop Apps
- Hardware
- ICS
- Informational
- Infrastructure
- iOS
- IoT
- Kubernetes
- Linux
- OSINT
- PCI DSS
- Purple Team
- Red Team
- Reverse Engineering
- Smart Contracts
- Software Supply Chain
- Web Application
- Wireless Network
- Managed SOC
- Managed SOC
- Managed SOC
- VIDEOS
- Blog
- Videos
- Hardware Security Assessments
- Kubernetes configuration reviews
- Threat Modeling
- OSINT
- External Network Penetration Testing
- Cloud Penetration Testing
- Smart Contracts Security Assessments
- Wireless Network Penetration Testing
- Firewall Configuration Reviews
- Phishing Simulations
- Host Reviews

Security Advisory – Multiple Vulnerabilities in LB-link BL-W1210M Router
Routers form the backbone of modern digital infrastructure, enabling connectivity for homes, businesses, and entire networks. However, when vulnerabilities exist in these devices, they can

Domain Trusts: An Exploitation Playbook
Domain Trusts: An Exploitation Playbook Understanding domain trusts in Windows Active Directory (AD) is essential for modern cybersecurity professionals. These trust relationships are the backbone

Car Hacking- The New Frontier In Cybersecurity
Car Hacking- The New Frontier In Cybersecurity As cars transform into rolling computers, they bring not just convenience—but also new risks. Modern vehicles are no

Security Advisory – Multiple Vulnerabilities in Netgear WNR614 Router
Legacy home and SOHO routers remain attractive targets for attackers. They sit at the network edge, handle all inbound/outbound traffic, and often expose a browser-based

Analyzing Firmware and Extracting Filesystem
Every modern device—whether it’s a Wi-Fi router, smart TV, medical equipment, or industrial controller—relies on firmware. Firmware is the invisible layer of code that powers

Cybersecurity Strategies For Small And Mid-Sized Businesses (SMBs)
Cybersecurity Strategies For Small And Mid-Sized Businesses (SMBs) Small and mid-sized businesses (SMBs) are increasingly turning to digital platforms to grow their brand presence, reach

Using Win32 API with Rust: A Step-by-Step Guide
Using Win32 API With Rust: A Step-By-Step Guide The Win32 API has been the backbone of Windows programming for decades, providing low-level access to operating

Digisol DG-GR1321: Plaintext Password Storage Vulnerability (CVE-2024-4232)
Digisol DG-GR1321: Plaintext Password Storage Vulnerability (CVE-2024-4232) Password security is one of the most fundamental pillars of protecting digital systems. Whether it’s a personal device,

Digisol DG GR1321’s Improper Access Control CVE-2024-4231
Routers are the backbone of modern digital connectivity, bridging the gap between private networks and the broader internet. Because of this critical role, they are

Digisol DG-GR1321 Password Policy Bypass Vulnerability (CVE-2024-2257)
A critical security flaw has been identified in the Digisol DG-GR1321 router (Hardware version: 3.7L; Firmware version: v3.2.02). The issue arises from the router’s improper

Asus RT-N12+ B1’s Credentials Stored in Cleartext – CVE‐2024‐28325
Ensuring the security of networking devices is more critical than ever in today’s connected world. Routers, often overlooked, are the gateways to our homes and

Asus RT N12 + B1’s Insecure Credential Storage CVE-2024-28327
In today’s connected world, routers act as the first line of defense for both home and business networks. When vulnerabilities are discovered in these devices,