Throughout our investigation, we identified hard-coded C2 IP addresses embedded in Open Source Projects through multiple methods: 1. Exploits and Proof-of-Concept (PoC) code Several public PoCs included "hidden callbacks pointing to external servers, often without any...
Explore our categories
Here’s where we keep you up to date with the latest cyber security research, vulnerabilities, threats and solutions.
Cyber Jungle Intelligence Series
We are excited to announce the launch of the Cyber Jungle Intelligence Series, a new line of investigative threat-intelligence reports designed to navigate the dense, unpredictable, and often hostile terrain of the cyber landscape. Much like a real jungle, today's...
Zerotak Launches UAE-Based Security Operations Center (SOC)
We are pleased to announce the development of a Security Operations Center (SOC) in Dubai, United Arab Emirates, to offer SOC-as-a-Service (SOCaaS) solutions. This initiative aims to enhance cybersecurity capabilities in the region by providing advanced threat...
Open-Source Security Tools for CI/CD Testing
In this article, we will take a look over some of the security tools that you can implement within the CI/CD pipelines testing, in order to early detect flaws or issues before deploying to production. All the tools listed are open-source or free to use. Why is it...
Credentials Harvesting using Swagger UI
In this blog post, we will see how attackers can take leverage of your exposed Swagger UI file in order to launch Credentials Harvesting attacks, and how you can protect against them. Attack Requirements Your organization exposes documentation for API services using...
Ready to get started?
Get in touch with one of our experts today to discuss your business needs.
