Skip to content

March 2019

Top 6 Subdomain Takeover attacks on Uber, Lamborghini, USA.gov

One of the major pain point for large enterprises is not knowing their digital infrastructure completely. Hackers are constantly looking for these soft targets. Subdomain Takeover is a type of vulnerability which occurs when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Amazon, Bitbucket, Desk,… Read More »Top 6 Subdomain Takeover attacks on Uber, Lamborghini, USA.gov

Analysing/Dissecting Uber Subdomain Takeover Attack – FireCompass

Subdomain Takeover is a type of vulnerability which appears when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized or has been migrated/deleted. In this blog, we will be dissecting Uber Subdomain takeover vulnerability… Read More »Analysing/Dissecting Uber Subdomain Takeover Attack – FireCompass

Shadow IT Threats – How To Turn Them Into Opportunity?

Shadow IT  threats involves pushing back on any initiatives that try to bypass IT and fighting the line of business managers for ownership of these projects. Shadow IT opportunity involves transforming shadow IT into official line-of-business shortcuts and becoming the corporate champion of innovative initiatives. Below are a few ways one could looks… Read More »Shadow IT Threats – How To Turn Them Into Opportunity?