John CookNov 2, 20233 minCVSS 4.0: The Evolution from CVSS v1 to CVSS v3The Common Vulnerability Scoring System (CVSS) is a commonly employed framework for evaluating the severity of vulnerabilities in...
John CookOct 22, 20233 minInfection of over 40,000 Cisco IOS XE devices with a zero-day backdoorOver 40,000 Cisco devices running the IOS XE operating system were affected by hackers using a newly found maximum severity vulnerability...
AegisbyteOct 10, 20234 minUnprecedented DDoS Attacks Launched Using HTTP/2 Rapid Reset Zero-Day Flaw.On Tuesday, leading tech giants Amazon Web Services (AWS), Cloudflare, and Google announced that they have successfully thwarted...
AegisbyteOct 9, 20233 minLooney Tunables: In-depth Analysis of Local Privilege EscalationExecutive Summary The GNU C Library's dynamic loader, ld.so, is responsible for locating and initializing shared libraries required by an...
AegisbyteOct 7, 20234 minRegular Cloud PenetrationTesting: The Crucial Aspect to Combat Evolving Threats.Table of contents Introduction Understanding Cloud Penetration Testing Benefits of Regular Cloud Penetration Testing Key Aspects of an...