How can I determine the vulnerability for a sub domain takeover attack?

I have found research efforts on explaining how sub domain takeovers can take place authored by a gentleman named “Patrik Hudák”. Through his site’s blogs he illustrates and conveys an understanding of the phenomenon:

https:… Continue reading How can I determine the vulnerability for a sub domain takeover attack?

What are most dangerous vulnerabilities of users of password management?

Are there any examples where something goes wrong. For example, say people misused password managers and got hacked or take some loss? If so how?

Basically, I sort of know the typical vulnerabilities of password management (… Continue reading What are most dangerous vulnerabilities of users of password management?

How to discover known vulnerabilities (CVEs) in Go executables?

Tools that discover CVEs need to create software bill-of-material. In many cases it can be done simply by inspecting files on the target system e.g. RPM or NPM index.

Would it be possible to do composition analysis on Go exe… Continue reading How to discover known vulnerabilities (CVEs) in Go executables?