top of page

The Cybersecurity Blog
A Security Consultant’s Guide for Businesses.
As a security consultant, I often remind business leaders that the most dangerous cyber attacks are not the ones you can see; they’re the...
The Fall of xxxcompany, our real customer.
Initial Access The attacker discovered an outdated plugin on a public WordPress subdomain. They used a command-line scan to identify...
Hacking a Fintech App via Broken API Authorization.
It started with a simple curiosity. A bug bounty hunter known as RedFox registered an account on a trendy fintech app called FinCash ....
bottom of page