Xander.Ritt@gmail.com
Valdosta, GA
LinkedIn
Home
About
News
Blog
Contact me!
June 2024
Uncategorized
CISA: Cisco ASA/FTD bug CVE-2020-3259 exploited in ransomware attacks – Source: securityaffairs.com
·
Feb 17, 2024
Uncategorized
CISA adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
·
Feb 17, 2024
Uncategorized
US gov offers a reward of up to $10M for info on ALPHV/Blackcat gang leaders – Source: securityaffairs.com
·
Feb 17, 2024
Uncategorized
Russia-linked Turla APT uses new TinyTurla-NG backdoor to spy on Polish NGOs – Source: securityaffairs.com
·
Feb 17, 2024
Uncategorized
US Gov dismantled the Moobot botnet controlled by Russia-linked APT28 – Source: securityaffairs.com
·
Feb 17, 2024
Uncategorized
A cyberattack halted operations at Varta production plants – Source: securityaffairs.com
·
Feb 17, 2024
Uncategorized
North Korea-linked actors breached the emails of a Presidential Office member – Source: securityaffairs.com
·
Feb 17, 2024
Uncategorized
AUDITING ARTIFICIAL INTELLIGENCE
·
Feb 17, 2024
Uncategorized
NIS 2 Directive and ISO 27001:2022
·
Feb 17, 2024
Uncategorized
HYDRA A Detailed Guide
·
Feb 17, 2024
←
Previous Page
1
…
1,958
1,959
1,960
1,961
1,962
…
2,057
Next Page
→
Search
Archive
January 2025
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
Categories
Uncategorized
Recent Posts
Your Ultimate Guide to NIS2 Compliance: Key Steps and Insights – Source: heimdalsecurity.com
January 16, 2025
Head of US Cybersecurity Agency Says She Hopes It Keeps up Election Work Under Trump – Source: www.securityweek.com
January 16, 2025
FBI Uses Malware’s Own ‘Self-Delete’ Trick to Erase Chinese PlugX From US Computers – Source: www.securityweek.com
January 16, 2025
DORA’s Deadline Looms: Navigating the EU’s Mandate for Threat Led Penetration Testing – Source: www.securityweek.com
January 16, 2025
Cyber Insights 2025: Open Source and Software Supply Chain Security – Source: www.securityweek.com
January 16, 2025
Tags
Social Links
Facebook
Twitter
LinkedIn
Instagram