Failure of Secure SDLC: Why Vulnerabilities Still Ship

Every organization today claims to follow a Secure SDLC. And yet, vulnerabilities still reach production — not rarely, but routinely. Not exotic zero-days. Not nation-state exploits. But basic, structural flaws that should never have existed in the first place. So the uncomfortable question is not whether Secure SDLC exists.It’s whether it actually works the way…

Dissecting Akira Ransomware: Techniques, Payloads, and Lessons Learned

Introduction We will move our discussion ahead from our last topic on Ransomware and will go through a ransomware Akira. In the crowded and ever-evolving ransomware landscape, Akira has quickly established itself as one of the most disruptive players. Emerging in March 2023, Akira targets organizations with a double extortion playbook — exfiltrating sensitive data…

Ransomware 101: Understanding the Threat

Introduction Ransomware has evolved from being a nuisance for individual computer users to one of the most damaging threats to modern organizations.It’s not just about encrypting files anymore — the latest ransomware operations have become full-fledged criminal enterprises, combining data theft, extortion, and public shaming into a single high-pressure attack model. In this blog, we’ll…

Insecure Deserialization in .NET: Risk and Fixing Legacy Code

Introduction We have discussed in the previous post regarding the introduction, basically Insecure deserialization is a critical vulnerability that often lurks in legacy systems and internal applications. Serialization and deserialization are foundational operations in modern software development, enabling communication between systems, data storage, and object persistence. However, improper use of deserialization—particularly with unsafe serializers like…

Legacy code and deserialization

Insecure Deserialization: A Silent Killer in Modern Applications

In the realm of cybersecurity, one vulnerability that continues to haunt developers and security professionals alike is insecure deserialization. This seemingly innocuous process, crucial for transferring data between systems, harbors a myriad of risks when implemented carelessly. We delve deep into the intricacies of insecure deserialization, uncover its potential threats. I will also demonstrate practical…

AWS S3 Bucket Discovery

Amazon Web Services (AWS) is a leading cloud computing platform that provides organizations. It has a wide range of services to build and deploy applications, store data, and manage infrastructure. One of the core services offered by AWS is Amazon Simple Storage Service (S3), a scalable object storage solution designed to store and retrieve data…

Navigating the Cyber Landscape: Top Security Trends for 2024

As we stride into the future, the digital landscape continues to evolve, presenting new challenges and opportunities in the realm of cybersecurity. With cyber threats growing in complexity and sophistication, it’s crucial for organizations to stay abreast of the latest trends to safeguard their assets effectively. In this article, we’ll delve into the top security…