Watch the Typo: Our PoC Exploit for Typosquatting in GitHub Actions
In the world of software development, automation is a huge time-saver, and GitHub Actions is one of the best tools...
In the world of software development, automation is a huge time-saver, and GitHub Actions is one of the best tools...
We’re excited to announce that the Orca Research Pod has launched AI Goat, the first open source AI security hands-on...
A critical Remote Unauthenticated Code Execution (RCE) vulnerability has been discovered in OpenSSH server (sshd) on glibc-based Linux systems (Ubuntu,...
Table of contentsBuilding the vulnerable scenariosScenario 1: Web application vulnerabilityScenario 2: CI/CD server vulnerabilityAutomated vulnerability detection using Nuclei templatesScenario 1:...
With 84% of vulnerable and exposed TeamCity servers likely already compromised, the recent issue in JetBrains’ TeamCity illustrates how a...
Following our discovery of a critical loophole in Google Kubernetes Engine (GKE) dubbed Sys:All, we decided to conduct research into...