DualScope insights

Security Research Articles

Reviewed analysis with source links, defensive hypotheses and control guidance.

Network Security · 16 min read

FIRESTARTER and the Firewall Persistence Problem

CISA, the UK NCSC and Cisco describe FIRESTARTER as persistence on Cisco Firepower and Secure Firewall devices running ASA or FTD software. The operational lesson is sharp: if the public indicator is present, an upgrade alone is not enough; Cisco recommends reimaging and upgrading to fixed releases, while a physical cold restart is only a risky temporary mitigation.

Editorial Methodology · 9 min read

How DualScope Chooses Cybersecurity Sources and Uses CISA KEV

DualScope separates raw cybersecurity feeds from reviewed summaries. This article explains the source mix, why official advisories matter, how CISA KEV is used, and what common acronyms mean before they become shorthand in the rest of the site.

Cloud, Identity & SaaS · 12 min read

Vercel, Context.ai and the Open Authorization Supply Chain Problem

Vercel says attackers used access connected to Context.ai to reach internal systems and enumerate non-sensitive environment variables. The deeper lesson is that Open Authorization (OAuth) grants, artificial intelligence (AI) productivity tools, browser sessions and developer platforms now form one connected attack surface.

Healthcare Security · 13 min read

Stryker, Intune and the Risk of Destructive Cloud Admin Actions

Reports on the March 2026 Stryker incident describe global disruption, wiped employee devices, and a possible Microsoft Intune remote-wipe path. The lesson is broader than one company: endpoint-management consoles are powerful administrative planes, and destructive actions need stronger guardrails than ordinary helpdesk workflows.