/ posts / 3
In today’s interconnected world, where the traditional network perimeter has all but dissolved, the concept of “trust but verify” has become dangerously outdated. Enter Zero Trust Architecture (ZTA)…
Zip Slip was a vulnerability found in the file extraction mechanism employed in programming languages. It was discovered and responsibly disclosed by the Snyk Security team ahead of a public…
Dirty COW is a computer security vulnerability that was discovered in the Linux Kernel in 2016. The exploit was registered under CVE with the designation: CVE-2016-5195. Dirty COW is a root privilege…
Alexander Graham Bell once said- “Did you ever measure a smell? Can you tell whether one smell is just twice strong as another? Can you measure the difference between two kinds of smell and another?…
In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor like an attacker, to perform unauthorized actions within a computer system.
These vulnerabilities have to…
Unix & Linux provides Read(r),Write(w) and Execute(x) permissions to any file on the system.
If you ls -l every file with its permissions will be shown.