Skip to content

Continuous Automated Red Teaming (CART)

Unveiling the Intricacies of HTTP Smuggling: A Technical Exploration

Unveiling the Intricacies of HTTP Smuggling: A Technical Exploration Attackers are always looking for new ways to get around protections and exploit flaws in the dynamic field of web security. HTTP smuggling is one such clever method that has gained popularity recently. By taking advantage of the complexities in the interpretation and processing of HTTP… Read More »Unveiling the Intricacies of HTTP Smuggling: A Technical Exploration

FireCompass Secures USPTO Patent for Automated Red Teaming

FireCompass Secures USPTO Patent for Automated Red Teaming

FireCompass has recently secured a patent from the United States Patent and Trademark Office (USPTO) for their innovative approach to Automated Red Teaming in Organizational Networks. This milestone is set to reshape the landscape of cybersecurity, particularly in the realms of Automated Pen testing and Red Teaming. The minds behind this revolutionary technology are Arnab… Read More »FireCompass Secures USPTO Patent for Automated Red Teaming

Importance of GitHub Reconnaissance in CASM & CART

GitHub reconnaissance is an important aspect of attack surface management, particularly for organizations and individuals who rely heavily on software development and open-source code. Here’s why it is crucial: Discovery of Sensitive Information Developers sometimes inadvertently push sensitive information e.g. hardcoded credentials, API keys, access tokens and Configuration Files containing sensitive information Identification of Security… Read More »Importance of GitHub Reconnaissance in CASM & CART

Unveiling the Veil: A Case Study on Recent Critical Vulnerabilities

In the ever-evolving landscape of digital connectivity and technology, organizations face an incessant challenge to fortify their cyber defenses against an ever-expanding array of threats. The rapid advancement of information technology has brought about unparalleled convenience and efficiency, but it has also ushered in an era where the vulnerability of digital ecosystems is a constant… Read More »Unveiling the Veil: A Case Study on Recent Critical Vulnerabilities

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

In a recent panel discussion on the “Ransomware Case Study,” cybersecurity expert Bikash Barai shared compelling insights into his advisory experience, shedding light on his active involvement in negotiating ransomware with hackers and threat actors. This discussion, featuring Bikash Barai (Co-Founder, FireCompass), Kinshuk De (Head Incident Response, TCS), Venkat Ramshet (Founder, Flexible IR) and Ashwani Paliwal (Founder, SecOps),… Read More »Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics