Skip to content

others

Critical CVEs: FortiOS, Microsoft Exchange, vSphere, SolarWinds and More

Critical CVEs: FortiOS, Microsoft Exchange, vSphere, SolarWinds and More

Critical CVEs: FortiOS, Microsoft Exchange, vSphere, SolarWinds and More From February 12th to 16th, the FireCompass research team identified a huge number of CVEs that are high in severity and ransomware, botnets, and threat actors creating havoc. Some of the CVEs identified are of popular commercial products used by various industries and some new &… Read More »Critical CVEs: FortiOS, Microsoft Exchange, vSphere, SolarWinds and More

Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More

Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More

Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More This week from February 5th to 9th, the FireCompass research team identified a huge number of CVEs that are high in severity and ransomware, botnets, and threat actors creating havoc. Some of the CVEs identified are of popular commercial products used by… Read More »Critical CVEs And Active Threats: IBM Security, CISCO Expressway, Microsoft Windows and More

FireCompass Secures USPTO Patent for Automated Red Teaming

FireCompass Secures USPTO Patent for Continuous Automated Red Teaming (CART)

FireCompass has recently secured a patent from the United States Patent and Trademark Office (USPTO) for their innovative approach to Continuous Automated Red Teaming (CART) in Organizational Networks. This milestone is set to reshape the landscape of cybersecurity, particularly in the realms of automated penetration testing and red teaming. The minds behind this revolutionary technology… Read More »FireCompass Secures USPTO Patent for Continuous Automated Red Teaming (CART)

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

In a recent panel discussion on the “Ransomware Case Study,” cybersecurity expert Bikash Barai shared compelling insights into his advisory experience, shedding light on his active involvement in negotiating ransomware with hackers and threat actors. This discussion, featuring Bikash Barai (Co-Founder, FireCompass), Kinshuk De (Head Incident Response, TCS), Venkat Ramshet (Founder, Flexible IR) and Ashwani Paliwal (Founder, SecOps),… Read More »Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Exploring API Subdomains

What are API Subdomains? Subdomains of a website or web application that are reserved especially for hosting APIs (Application Programming Interfaces) are known as API subdomains. These subdomains are used to provide access to various functionalities and data through standardized interfaces, allowing developers to interact with the system programmatically. A Simple Example Suppose you have… Read More »Exploring API Subdomains