Blog

Latest Posts

Unauthorized Access to Critical Documents

Today we are going to talk about a vulnerability found in one of our External Pentesting exercises. For security reasons, the name of the client…

From a Path Traversal to Pwning the AWS Infraestructure

Today, we bring you an insightful article that delves into a real-world attack, showcasing how a vulnerability allowing arbitrary file reading can escalate, ultimately compromising…