Skip to content

research.securitum.com

securitum.com vulnerabilities researches and cyber security education publications

  • Research blog
  • Penetration Testing
  • Contact us
  • About us

Year: 2021

Is running legacy software with no publicly known exploits safe?

| November 23, 2021November 23, 2021 | Education, Research

There is a lot of legacy software running all over the network. This is an excellent example of technological debt. And the debt means that we are borrowing. We borrow time before compromise. It’s quite easy to identify that some software or system is outdated and no longer supported. Yet, it seems that no one …

Read more

Comparison of reverse image searching in popular search engines [OSINT hints]

Krzysztof Wosiński | August 11, 2021August 11, 2021 | Research

A little experiment – comparison of Google, Bing and Yandax in terms of reverse image search. Guest post by Krzysztof Wosinski

Read more

fail2ban – Remote Code Execution

Jakub Żoczek | July 26, 2021July 26, 2021 | Research

This article is about the recently published security advisory for a pretty popular software, fail2ban (CVE-2021-32749). It is about a bug that may lead to Remote Code Execution.

Read more

Find us on Linkedin!

Research updates?

We keep your data private and use it only for research updates newsletter. We also hate spam! Read our Privacy Policy.

Check your inbox or spam folder to confirm your subscription.

Categories

  • Education 44
  • Research 35
  • Uncategorized 1

Tags

Active Directory · Analysis · Apache · Browser security · Bug Bounty · Bypass · CA · Camera · CCTV · Cryptography · CSS · Desktop · dompurify · FDE · Google · Hack · hacking · HTTP · HTTP/2 · IDS · IoT · javascript · json web token · jwt · kibana · Linux · lsass · Malware · Mozilla Firefox · mxss · NMAP · OSINT · pebble · RCE · Reconnaissance · SSL · ssti · Takeover · Upload · Vulnerability · Web Hacking · WiFi · windows · Wordpress · XSS

Archives

  • 2023 3
  • 2022 8
  • 2021 3
  • 2020 10
  • 2019 8
  • 2018 10
  • 2017 18
  • 2016 8
  • 2015 5

Follow us on:

  • LinkedIn
  • Facebook
  • Twitter
  • GitHub

Pages

  • Research Home Page
  • Penetration testing
  • Privacy Policy
  • About us
  • Contact us

Recent Posts

  • How Private Cache Can Lead to Mass Account Takeover – pentest case July 12, 2023
  • XSS in WordPress via open embed auto discovery May 29, 2023
  • How to access data secured with BitLocker? Do a system update January 12, 2023
  • Amazon once again lost control (for 3 hours) over the IP pool in a BGP Hijacking attack October 28, 2022
  • SOCMINT – or rather OSINT of social media October 15, 2022
©2025 research.securitum.com
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. You can read more at our Privacy Policy (link below).Ok