Michael Raypold, VP of Engineering
1. Tell me about the Flashpoint Firehose. What needs and challenges was it built to address? Michael Raypold: The Flashpoint Firehose is a data-as-a-service solution…
1. Tell me about the Flashpoint Firehose. What needs and challenges was it built to address? Michael Raypold: The Flashpoint Firehose is a data-as-a-service solution…
Key Takeaways An open directory associated with a ransomware affiliate, likely linked to the Fog ransomware group, was discovered in December 2024. It contained tools…
The strength of our URL Validation Bypass Cheat Sheet lies in the contributions from the web security community, and today’s update is no exception. We…
AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task — are…
This week on the Lock and Code podcast… On February 8, during the Super Bowl in the United States, countless owners of one of the…
Ravie LakshmananMar 03, 2026Vulnerability / Mobile Security Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices…
I. Introduction In this article, I will provide a brief overview of the Windows Package Manager – WinGet. Following that, I will demonstrate how to…
A vulnerability in Redis in-memory store posed a critical risk for servers hosting the database. The vulnerability, identified as CVE-2025-49844 or RediShell, stemmed from a…
If you want to encrypt your Windows PC’s disk but you don’t want to store your recovery key with Microsoft, you do have options. We’ll…
Telegram: A crucial modern warfare channel Telegram, with its 700 million-plus-strong user base, has evolved into a pivotal communication hub for Hamas and Palestinian Islamic…
The story so far In Part 1, we learned that Impacket’s LDAP reconnaissance tools use OID-based filters that get transformed into bitwise operations in Event…
HTTP cookies often control critical website features, but their long and convoluted history exposes them to parser discrepancy vulnerabilities. In this post, I’ll explore some…