Recent articles
-
SpotBugs Access Token Theft is a Wake-Up Call for Software Security
In an age where open-source software dominates the tech landscape, the security of supply chains is of paramount importance. The…
-
Embracing Distroless Containers for Secure Software Delivery
The evolution of containerization and the rise of cloud-native applications signal a pivotal moment in software development. As demands for…
-
Exploring Null Session Vulnerabilities in Windows MS-RPC Interfaces
As cybersecurity threats evolve, the potential vulnerabilities associated with null sessions and MS-RPC interfaces remain a pressing concern for network…
-
Ivanti Vulnerability Leads to Exploit of TRAILBLAZE and BRUSHFIRE Malware
In an age where cybersecurity threats lurk around every corner, recent news regarding Ivanti’s Connect Secure highlights a particularly severe…
-
Emerging Cyber Threat: WRECKSTEEL Malware Targeting Ukrainian Infrastructure
The rapid advancement of technology brings with it a formidable rise in cyber threats. In recent updates, the Computer Emergency…
Author Details

Iulian Rotaru
Helping Businesses Stay Secure
Freelance Penetration Tester
Ethical Hacker
Cybersecurity Researcher