top of page
Search


Exploiting User Registration and Membership Logic for Privilege Escalation (CVE-2025-2563)
As defenders patch vulnerabilities in production environments, threat actors continually adapt to exploit new weaknesses, sometimes for financial gain and sometimes to disrupt operations. In this blog, we'll explore how attackers can escalate privileges via a web GUI and ultimately obtain shell access by exploiting a recently disclosed WordPress vulnerability, CVE-2025-2563 . We'll walk through the attack chain from an attacker’s perspective against a practice (non-production
Daniel Vazquez
2 days ago5 min read


How to Build Your Own DNS Sinkhole and DNS Logs Monitoring System
Pi-hole logs each DNS event, including domain resolutions and blocks. DNS logs are a gold mine that is often overlooked by network defenders
Ronny Thammasathiti & James Kelly
Oct 26, 202312 min read
bottom of page
