Skip to content

Blog

Exploring API Subdomains

What are API Subdomains? Subdomains of a website or web application that are reserved especially for hosting APIs (Application Programming Interfaces) are known as API subdomains. These subdomains are used to provide access to various functionalities and data through standardized interfaces, allowing developers to interact with the system programmatically. A Simple Example Suppose you have… Read More »Exploring API Subdomains

Google Dorking for Continuous Attack Surface Management

Google Dorking, also known as Google hacking, is a technique where advanced search operators are used to find specific information on search engines. It involves crafting search queries to discover vulnerable or exposed data on the internet. Attack surface management involves identifying and securing all possible entry points into an organization’s systems and networks. It… Read More »Google Dorking for Continuous Attack Surface Management

Critical CVEs And Active Threats: IBM Aspera Console, Barracuda Networks Inc and More

During the week of  December 25 to 29, FireCompass research team identified a huge number of CVEs that are high in severity and ransomware, botnets, and threat actors creating havoc. Some of the CVEs identified are of popular commercial products used by variants of industries and somenew & well known malwares targeting industries for this… Read More »Critical CVEs And Active Threats: IBM Aspera Console, Barracuda Networks Inc and More

Critical CVEs and Active Threats: CloudPanel, Apache Log4j, NetgatePFsense, Palo Alto & More

During this week from December 11 to 15, the FireCompass research team uncovered a substantial number of Common Vulnerabilities and Exposures (CVEs) marked as high severity. Notably, ransomware, botnets, and various threat actors were causing significant disruptions. Among the identified CVEs were vulnerabilities found in widely-used commercial products across various industries. Additionally, new and familiar… Read More »Critical CVEs and Active Threats: CloudPanel, Apache Log4j, NetgatePFsense, Palo Alto & More