Monthly articles about threat intelligence, Cyber Security, AppSec, and best practices in Information Security.
-

NoSQL Injection in the Real World: Breaking Mongoose with CVE-2025-23061
NoSQL has spent years enjoying a strangely comfortable reputation, almost as if removing the word SQL also removed the chance of turning user input into a security problem. Sadly, attackers never signed that agreement. This article explores NoSQL Injection through a controlled lab based on CVE-2025-23061, a critical Mongoose flaw tied to “populate().match”. The vulnerable…
-

How AI Is Actually Helping Pentesters Today
If the internet is to be believed, AI is either replacing every pentester next week or doing nothing beyond rewriting payloads with extra confidence. As usual, both takes are a little dramatic and a lot less useful than reality. This article is not about attacking AI systems themselves. That angle was already covered in The…
-

The n8n Nightmare: Exploiting CVE-2026-21858
Automation is supposed to save time, reduce mistakes, and make teams look far more organized than they really are. Then a critical vulnerability shows up and reminds everyone that giving one platform access to files, workflows, secrets, and integrations was definitely a bold lifestyle choice. That is exactly why CVE-2026-21858 got so much attention. It…
-

Container Security Isn’t Just Image Scanning
Containers made software delivery faster, cleaner, and much easier to scale. Teams package an app, ship it, and move on. Security shows up, adds image scanning to the pipeline, and suddenly everyone sleeps better. Fair enough. Green checks are comforting. Sadly, attackers do not care how pretty your dashboard looks. Why Image Analysis Matters Image…
-

IAM Isn’t Just SSO: The Team, the Process, and the Tools
Identity and Access Management (IAM) is one of those topics that feels painfully boring, right up until someone gets access they shouldn’t, and suddenly it’s everybody’s “top priority.” At its core, IAM is simply how a company manages identities and controls who can access what, when, and under which conditions. In this article on VSec,…
-

Understanding LFI Attacks: The CVE-2024-32982 Example
LFI (Local File Inclusion) is the tiny coding mistake that quietly hands attackers access to files they shouldn’t see — and sometimes to code execution if the app processes the included content. Different from Path Traversal, which typically only exposes files, LFI can let the application use or execute those files. This article explains how…
