OWN.SH
Blog
/
Projects
Tags
Vulnerabilities
Exploits
Penetration Testing
Red Teaming
Blue Teaming
Threat Intelligence
Incident Response
Security Best Practices
Artificial Intelligence
Latest Posts
Attack Window Compression: How AI is Reducing Time-to-Impact in Modern Cyberattacks
11/15/2025
As adversaries begin to automate more of their operations with AI, defenders will need to leverage the same technology in new creative ways. We must be more proactive at finding and fixing vulnerabilities, while also enabling faster response times. We must also be mindful of our own use of AI, and ensure that we are not creating new problems for ourselves.
CVE-2025-9074: When Docker Desktop's Internal API Goes Rogue
9/5/2025
A critical container escape vulnerability in Docker Desktop allows any running container to access the Docker Engine API without authentication, potentially leading to full host compromise.
BadSuccessor Unveiled: CVE-2025-53779 Deep Dive into Windows Server 2025's dMSA Privilege Escalation
8/16/2025
Comprehensive technical analysis of CVE-2025-53779 (BadSuccessor), a critical Windows Kerberos vulnerability that allows domain-wide privilege escalation through delegated Managed Service Account abuse