Skip to content

Priyanka Aash

Priyanka has 10+ years of experience in Strategy, Community Building & Inbound Marketing and through CISO Platform has earlier worked with marketing teams of IBM, VMware, F5 Networks, Barracuda Network, Checkpoint, and more. Priyanka is passionate about Entrepreneurship and Enterprise Marketing Strategy. Earlier she co-founded CISO Platform- the world’s 1st online platform for collaboration and knowledge sharing among senior information security executives.

Critical CVEs and Active Threats: CloudPanel, Apache Log4j, NetgatePFsense, Palo Alto & More

During this week from December 11 to 15, the FireCompass research team uncovered a substantial number of Common Vulnerabilities and Exposures (CVEs) marked as high severity. Notably, ransomware, botnets, and various threat actors were causing significant disruptions. Among the identified CVEs were vulnerabilities found in widely-used commercial products across various industries. Additionally, new and familiar… Read More »Critical CVEs and Active Threats: CloudPanel, Apache Log4j, NetgatePFsense, Palo Alto & More

Importance of API Discovery in Attack Surface Management

What is API Discovery? API discovery plays an important role while mapping the attack surface for a company during aΒ  security assessment or any kind of engagement. The discovery allows an organization to map its all API’s and can check which person has what permissions on the API. The Importance Of API Discovery API discovery… Read More »Importance of API Discovery in Attack Surface Management

The Art of Keytab Files

A keytab file is a file containing pairs of Kerberos principals and encrypted keys. These files are used to authenticate a principal on a network. Kerberos is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Brief Overview of Keytab Files… Read More »The Art of Keytab Files

Critical CVEs and Active Threats: IBM, ALEOS, JetBrain & More

Critical CVEs and Active Threats: IBM, ALEOS, JetBrain & More

During the week spanning December 04 to 09, the FireCompass research team uncovered a substantial number of Common Vulnerabilities and Exposures (CVEs) marked as high severity. Notably, ransomware, botnets, and various threat actors were causing significant disruptions. Among the identified CVEs were vulnerabilities found in widely-used commercial products across various industries. Additionally, new and familiar… Read More »Critical CVEs and Active Threats: IBM, ALEOS, JetBrain & More

Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

Race conditions, a critical vulnerability, arise when multiple processes or threads execute concurrently within a software system. This blog aims to provide a comprehensive understanding of race conditions and effective prevention strategies, accompanied by practical examples. Misconception – Is it commonly believed that Race Condition Bugs primarily result in Denial of Service (DoS)? Contrary to… Read More »Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

CONSENT REQUIRED

Before you continue β€”
a quick consent notice

This website uses functional cookies and third-party services to operate. Before they can load, we need your consent through our Consent Management Platform, operated by CookieYes (cookieyes.com).

Data transmitted to cookieyes.com
  • Your browser's IP address β€” transmitted as part of the outbound HTTP request
  • Your browser's User-Agent string β€” transmitted as part of the outbound HTTP request
  • No other data is collected or transmitted at this stage

Functional cookies are required for this website to operate. If you decline, the site cannot be fully displayed. You are always welcome to return and accept at any time.