This is a security and privacy oriented blog. The idea is to provide insight information about what an attacker can do with the described vulnerability in different scenarios and how to avoid situation like this.
Information regarding vulnerabilities that are classified as low or medium will be discussed in several different situations. Where one vulnerability by it self might not be severe, it could be the last piece of a puzzle for taking over account or an entire server when combining multiple vulnerabilities.
Some of the articles on this blog are posted as a reference that can be used while performing security assessments or penetration tests.
Additionally, articles regarding vulnerabilities discovered in hardware devices such as routers and storage devices will be posted. If you have a project or a device that requires some security testing, feel free to contact me.