Skip to content

Blog

Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More

Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More

Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More This week from February 5th to 9th, the FireCompass research team identified a huge number of CVEs that are high in severity and ransomware, botnets, and threat actors creating havoc. Some of the CVEs identified are of popular commercial products used by… Read More »Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More

Uncovering Hidden Secrets Within JavaScript Files

Uncovering Hidden Secrets Within JavaScript Files JavaScript is one of the most popular programming languages, and modern web applications heavily rely on this framework. Starting from API calls, many critical functionalities are built on the client side nowadays. Through this blog, I will demonstrate how to automate your task to find unique vulnerabilities in JavaScript… Read More »Uncovering Hidden Secrets Within JavaScript Files

Critical CVEs And Active Threats: Apache Kafka-Ui, Ivanti Multiple Product, J-Web of Juniper Networks Junos OS and More

Critical CVEs And Active Threats: Apache Kafka-Ui, Ivanti Multiple Product, J-Web of Juniper Networks Junos OS and More This week from January 29th to February 02nd, FireCompass research team identified a huge number of CVEs that are high in severity and ransomware, botnets, and threat actors creating havoc. Some of the CVEs identified are popular… Read More »Critical CVEs And Active Threats: Apache Kafka-Ui, Ivanti Multiple Product, J-Web of Juniper Networks Junos OS and More

Unveiling the Trojan Horses Within: Navigating Insider Threats in Your Organization

Unveiling the Trojan Horses Within: Navigating Insider Threats in Your Organization In the vast arena of cybersecurity, while external threats often take the spotlight, a stealthier danger lurks within the very fabric of organizations—the insider threat. Imagine the security gates wide open to those deemed trustworthy, yet harboring the potential to wreak havoc or inadvertently… Read More »Unveiling the Trojan Horses Within: Navigating Insider Threats in Your Organization

Understanding SNMP Enumeration

Understanding SNMP Enumeration SNMP (Simple Network Management Protocol) is a widely used protocol for managing and monitoring network devices. SNMP enumeration is a crucial step in understanding the configuration and health of a network. In this blog post, we’ll explore the fundamentals of SNMP enumeration, and its importance, and provide practical examples to demonstrate the… Read More »Understanding SNMP Enumeration