top of page
Search


Exploiting User Registration and Membership Logic for Privilege Escalation (CVE-2025-2563)
As defenders patch vulnerabilities in production environments, threat actors continually adapt to exploit new weaknesses, sometimes for financial gain and sometimes to disrupt operations. In this blog, we'll explore how attackers can escalate privileges via a web GUI and ultimately obtain shell access by exploiting a recently disclosed WordPress vulnerability, CVE-2025-2563 . We'll walk through the attack chain from an attacker’s perspective against a practice (non-production
Daniel Vazquez
Nov 45 min read


How to go Phishing with Gophish
How to conduct basic phishing campaigns using Gophish, an open-source tool for testing an organization’s vulnerability to phishing.
Nihaal Prasad
Aug 10, 20217 min read


Meltdown and Spectre: Quick Overview and Next Steps
The purpose of this blog post is not to provide an exhaustive overview of Meltdown and Spectre, but instead to provide key points and caveat
Ben Hughes
Jan 4, 20185 min read
bottom of page
