A technical analysis of the two newly released high severity vulnerabilities in OpenSSL, dubbed CVE-2022-3786 and CVE-3602.
Category: Security Best Practices
Domain Takeover occurs when the organization did not renew its domain but still use it in their code and infrastructure. When the attacker registers the abandoned domain, they own the domain, including its subdomains and other types of DNS records.
Internet-wide research on the security posture of databases exposed on the internet. This blog contains all the specifics and analysis of results.
According to the CISO’s Benchmark Report 2020, businesses are struggling to manage remote workers’ use of phones and other mobile devices. Here are the work-from-home cybersecurity tips for both employers and employees.
This blog discusses the common vulnerabilities or misconfigurations that a threat actor can exploit on login functionality & some remediations around it.
In the dependency confusion attacks, a user can be tricked into installing a malicious dependency/library instead of the one they intended to install.
We, at RedHunt Labs, focus on reducing your organization’s attack surface, help your organization avoid data breaches and help companies mitigate threats before it is too late?
CISOs have a vast array of responsibilities, including identifying and protecting against current threats as well as being prepared for the threats of the future.