Xander.Ritt@gmail.com
Valdosta, GA
LinkedIn
Home
About
News
Blog
Contact me!
March 2024
Uncategorized
Spear Phishing vs Phishing: What Are The Main Differences? – Source: www.techrepublic.com
·
Feb 7, 2024
Uncategorized
DEF CON is canceled! No, really this time – but the show will go on – Source: go.theregister.com
·
Feb 7, 2024
Uncategorized
Chinese Hackers Exploited FortiGate Flaw to Breach Dutch Military Network
·
Feb 7, 2024
Uncategorized
Chinese hackers infect Dutch military network with malware – Source: www.bleepingcomputer.com
·
Feb 7, 2024
Uncategorized
Mastering SBOMs: Best practices – Source: securityboulevard.com
·
Feb 7, 2024
Uncategorized
Critical JetBrains TeamCity On-Premises Flaw Exposes Servers to Takeover – Patch Now
·
Feb 7, 2024
Uncategorized
Chinese Hackers Penetrated Unclassified Dutch Network – Source: www.databreachtoday.com
·
Feb 7, 2024
Uncategorized
Documents about the NSA’s Banning of Furby Toys in the 1990s – Source: www.schneier.com
·
Feb 7, 2024
Uncategorized
Beware: Fake Facebook Job Ads Spreading ‘Ov3r_Stealer’ to Steal Crypto and Credentials – Source:thehackernews.com
·
Feb 7, 2024
Uncategorized
CISA’s Flagship Cyber Collaborative Faces Growing Criticism – Source: www.govinfosecurity.com
·
Feb 6, 2024
←
Previous Page
1
…
1,988
1,989
1,990
1,991
1,992
…
2,037
Next Page
→
Search
Archive
January 2025
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
Categories
Uncategorized
Recent Posts
WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables
January 13, 2025
Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems
January 13, 2025
Phishing in 2024: Navigating the Persistent Threat and AI’s Double-Edged Sword – Source: www.cyberdefensemagazine.com
January 13, 2025
Phishing in 2024: Navigating the Persistent Threat and AI’s Double-Edged Sword – Source: www.cyberdefensemagazine.com
January 13, 2025
Phishing in 2024: Navigating the Persistent Threat and AI’s Double-Edged Sword – Source: www.cyberdefensemagazine.com
January 13, 2025
Tags
Social Links
Facebook
Twitter
LinkedIn
Instagram