top of page
Search


Exploiting User Registration and Membership Logic for Privilege Escalation (CVE-2025-2563)
As defenders patch vulnerabilities in production environments, threat actors continually adapt to exploit new weaknesses, sometimes for financial gain and sometimes to disrupt operations. In this blog, we'll explore how attackers can escalate privileges via a web GUI and ultimately obtain shell access by exploiting a recently disclosed WordPress vulnerability, CVE-2025-2563 . We'll walk through the attack chain from an attacker’s perspective against a practice (non-production
Daniel Vazquez
Nov 4, 20255 min read


Automated vs Manual Pentesting
With automation and Artificial Intelligence (AI) on the rise, it's becoming increasingly important to adapt to the tools and techniques...
Aaron Henderson
Aug 26, 20253 min read


Protecting Your Family and Personal Information
Personally Identifiable Information or PII is any information about a specific person that can be used to discover that person’s identity.
Pete Ningcharoen
Sep 4, 20244 min read


Celebrating Women in Cybersecurity
Polito would like to share resources aimed at women who are in cybersecurity or who are interested in getting into this amazing field.
Esther Matut
Mar 29, 20241 min read
bottom of page
