Written by Dominique Dittert, Senior Security Consultant, usd HeroLab In the dynamic field of cybersecurity, it is often the obscure and...
VULNERABILITIES
The Surprising Complexity of Finding Known Vulnerabilities
Most organizations extensively use third-party software products and libraries to increase efficiency and decrease costs. As various data breaches...
Deploying Files via Group Policies or How Group Policy Updates Can Ruin Your Day
During a workstation assessment in the beginning of 2021, we identified a trivial privilege escalation vulnerability occurring during Group Policy...