Skip to content

Priyanka Aash

Priyanka has 10+ years of experience in Strategy, Community Building & Inbound Marketing and through CISO Platform has earlier worked with marketing teams of IBM, VMware, F5 Networks, Barracuda Network, Checkpoint, and more. Priyanka is passionate about Entrepreneurship and Enterprise Marketing Strategy. Earlier she co-founded CISO Platform- the world’s 1st online platform for collaboration and knowledge sharing among senior information security executives.

Critical CVEs and Active Threats: CloudPanel, Apache Log4j, NetgatePFsense, Palo Alto & More

During this week from December 11 to 15, the FireCompass research team uncovered a substantial number of Common Vulnerabilities and Exposures (CVEs) marked as high severity. Notably, ransomware, botnets, and various threat actors were causing significant disruptions. Among the identified CVEs were vulnerabilities found in widely-used commercial products across various industries. Additionally, new and familiar… Read More »Critical CVEs and Active Threats: CloudPanel, Apache Log4j, NetgatePFsense, Palo Alto & More

The Art of Keytab Files

A keytab file is a file containing pairs of Kerberos principals and encrypted keys. These files are used to authenticate a principal on a network. Kerberos is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Brief Overview of Keytab Files… Read More »The Art of Keytab Files

Critical CVEs and Active Threats: IBM, ALEOS, JetBrain & More

Critical CVEs and Active Threats: IBM, ALEOS, JetBrain & More

During the week spanning December 04 to 09, the FireCompass research team uncovered a substantial number of Common Vulnerabilities and Exposures (CVEs) marked as high severity. Notably, ransomware, botnets, and various threat actors were causing significant disruptions. Among the identified CVEs were vulnerabilities found in widely-used commercial products across various industries. Additionally, new and familiar… Read More »Critical CVEs and Active Threats: IBM, ALEOS, JetBrain & More

Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

Race conditions, a critical vulnerability, arise when multiple processes or threads execute concurrently within a software system. This blog aims to provide a comprehensive understanding of race conditions and effective prevention strategies, accompanied by practical examples. Misconception – Is it commonly believed that Race Condition Bugs primarily result in Denial of Service (DoS)? Contrary to… Read More »Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities