Breaking Into Your Network? Zer0 Effort. - DEF CON 33 Overview
Uncovering critical flaws in ZTNA solutions, allowing attackers to escalate privileges on end user devices and to completely bypass authentication, …
Read ArticleUncovering critical flaws in ZTNA solutions, allowing attackers to escalate privileges on end user devices and to completely bypass authentication, …
Read ArticleFootguns and privilege escalations making multi-tenancy difficult in Kubernetes clusters.
Read ArticleAlways Trust, Never Verify - except when you have to trust the server isn’t malicious .. and install this CA certificate and MSI while …
Read ArticleIntroduction Delinea’s custom URL handler allows the software’s update process to be triggered, downloading and running an MSI from an …
Read ArticleAdvisory - Netskope Cross-tenant Authentication Bypass
Read ArticleAdvisory - Zscaler SAML Authentication Bypass (CVE-2025-549820)
Read Article