Latest Posts
Unauthorized Access to Critical Documents
Today we are going to talk about a vulnerability found in one of our External Pentesting exercises. For security reasons, the name of the client…
From a Path Traversal to Pwning the AWS Infraestructure
Today, we bring you an insightful article that delves into a real-world attack, showcasing how a vulnerability allowing arbitrary file reading can escalate, ultimately compromising…