AegisbyteOct 7, 20233 minMicrosoft explains how a crash dump led to a major security breach in OutlookMicrosoft disclosed on Wednesday 6 September, that a threat actor based in China and known as Storm-0558 obtained the inactive consumer...
AegisbyteAug 12, 20232 minDEF CON 31 Hacker JeopardyFor many in the hacking community, DEF CON, held annually in Las Vegas, isn’t just a conference; it’s a reunion. Among the many events and c
AegisbyteAug 4, 20233 minAzure OpenAI Receives P-ATO granted by FedRAMPMicrosoft Azure OpenAI Service has successfully obtained the U.S. Federal Risk and Authorization Management Program (FedRAMP) High...
AegisbyteJul 6, 20237 minStackRot (CVE-2023-3269) - Exploit Will Be Released Soon!Vulnerability StackRot (CVE-2023-3269) is a privilege escalation vulnerability in the Linux kernel. This disclosure complies with the...
AegisbyteJul 4, 20235 minpentestPenetration testing vs vulnerability scanningThe dynamic pair of cybersecurity techniques is Penetration testing vs vulnerability scanning Ah, the age-old battle of penetration...