Skip to content

others

Critical CVEs: FortiOS, Microsoft Exchange, vSphere, SolarWinds and More

Critical CVEs: FortiOS, Microsoft Exchange, vSphere, SolarWinds and More

From February 12th to 16th, the FireCompass research team identified a huge number of CVEs that are high in severity and ransomware, botnets, and threat actors creating havoc. Some of the CVEs identified are of popular commercial products used by various industries and some new & well-known malware targeting industries for this week. In this,… Read More »Critical CVEs: FortiOS, Microsoft Exchange, vSphere, SolarWinds and More

Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More

Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More

This week from February 5th to 9th, the FireCompass research team identified a huge number of CVEs that are high in severity and ransomware, botnets, and threat actors creating havoc. Some of the CVEs identified are of popular commercial products used by various industries and some new & well-known malware targeting industries for this week.… Read More »Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More

FireCompass Secures USPTO Patent for Automated Red Teaming

FireCompass Secures USPTO Patent for Automated Red Teaming

FireCompass has recently secured a patent from the United States Patent and Trademark Office (USPTO) for their innovative approach to Automated Red Teaming in Organizational Networks. This milestone is set to reshape the landscape of cybersecurity, particularly in the realms of Automated Pen testing and Red Teaming. The minds behind this revolutionary technology are Arnab… Read More »FireCompass Secures USPTO Patent for Automated Red Teaming

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

In a recent panel discussion on the “Ransomware Case Study,” cybersecurity expert Bikash Barai shared compelling insights into his advisory experience, shedding light on his active involvement in negotiating ransomware with hackers and threat actors. This discussion, featuring Bikash Barai (Co-Founder, FireCompass), Kinshuk De (Head Incident Response, TCS), Venkat Ramshet (Founder, Flexible IR) and Ashwani Paliwal (Founder, SecOps),… Read More »Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Exploring API Subdomains

What are API Subdomains? Subdomains of a website or web application that are reserved especially for hosting APIs (Application Programming Interfaces) are known as API subdomains. These subdomains are used to provide access to various functionalities and data through standardized interfaces, allowing developers to interact with the system programmatically. A Simple Example Suppose you have… Read More »Exploring API Subdomains