Skip to content

Blog

Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

Race conditions, a critical vulnerability, arise when multiple processes or threads execute concurrently within a software system. This blog aims to provide a comprehensive understanding of race conditions and effective prevention strategies, accompanied by practical examples. Misconception – Is it commonly believed that Race Condition Bugs primarily result in Denial of Service (DoS)? Contrary to… Read More »Securing Your Code: Unraveling the Secrets of Race Condition Vulnerabilities

Critical CVEs and Active Threats: OwnCloud, Apache, SolarWinds, Qlik Sense & More

Critical CVEs and Active Threats: OwnCloud, Apache, SolarWinds, Qlik Sense & More

This week from November 27 to December 02, Firecompass’s research team identified a huge number of CVEs that are high in severity and ransomware, botnets, and threat actors creating havoc. Some of the CVEs identified are of popular commercial products used by variants of industries and somenew & well known malwares targeting industries for this… Read More »Critical CVEs and Active Threats: OwnCloud, Apache, SolarWinds, Qlik Sense & More

Critical CVEs and Active Threats: CoreBos, Adobe Coldfusion, Kibana Server and More…

This week from November 20 to November 24, Firecompass research identified a huge number of CVEs that are high in severity and ransomware, botnets, and threat actors creating havoc. Some of the CVEs identified are of popular commercial products used by variants of industries and somenew & well known malwares targeting industries for this week.… Read More »Critical CVEs and Active Threats: CoreBos, Adobe Coldfusion, Kibana Server and More…

Attack & Defend LLMNR: A Widespread Shadow Network Discovery Protocol

Link-Local Multicast Name Resolution (LLMNR), a seemingly important protocol in Windows environments, can be a silent accomplice for cyber adversaries seeking to exploit network vulnerabilities. Let us understand the technical intricacies of LLMNR and unravel how it can be exploited for reconnaissance purposes, examining each step from a Red Teamer’s perspective. Understanding LLMNR LLMNR is… Read More »Attack & Defend LLMNR: A Widespread Shadow Network Discovery Protocol