Wendy Rodriguez
Consequential data breaches in the financial sector
Find out the harsh lessons that the most breached industry has to teach other companies.
Wendy Rodriguez
Data breaches that left their mark on time
A look back at these ill-intentioned attacks that made us grateful they weren't directed towards our organizations.
Carlos Bello
Beware of insecure-by-default libraries!
Here we present in detail a vulnerability we discovered in BookStack v23.10.2, along with the steps to follow to replicate the exploit.
Andres Roldan
An OffSec Exploitation Expert review
In this post, we review the EXP-401 course and OSEE certification offered by OffSec.
Carlos Bello
What is invisible to some hackers is visible to others
Here we present in detail a vulnerability we discovered in PaperCut MF/NG v22.0.10, along with the steps to follow to replicate the exploit.
Carlos Bello
Injecting JS into one site is harmful, into all, lethal
In this blog post, we present in detail a vulnerability we discovered in Rushbet v2022.23.1-b490616d, along with the steps to follow to replicate the exploit.
Carlos Bello
So it's the app itself that delivers the cookie to me?
In this blog post, I present in detail a zero-day vulnerability I discovered in KAYAK v161.1, along with the steps to follow to replicate the exploit.
Felipe Ruiz
Top 10 international capture the flag competitions
Do you know what capture the flag is in the cybersecurity field? Are you aware of some of the most recent and prominent CTF competitions worldwide? Learn here.
Andres Roldan
A Black Hat talk follow up
We will take a brief understanding at DirectX, a new attack surface on Hyper-V