Xander.Ritt@gmail.com
Valdosta, GA
LinkedIn
Home
About
News
Blog
Contact me!
August 2024
Uncategorized
How eBPF is changing appsec | Impart Security – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
DEF CON 32 – Curious Case of Alice & Bob: What You Can Do as Digital Investigators – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
Holiday Shopping Meets Cyber Threats: How Source Defense Detected the ESA Store Attack – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
Randall Munroe’s XKCD ‘Skew-T Log-P’ – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
Sonatype customers leading with innovation in the new year – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
DEF CON 32 – Physical OSINT – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
WordPress Plugin Exploited to Turn Legitimate Sites Into Phishing Traps – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
How a Global Insurer Protects Customer Data & Achieves Compliance With DataDome – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
Charter, Consolidated, Windstream reportedly join China’s Salt Typhoon victim list – Source: go.theregister.com
·
Jan 7, 2025
Uncategorized
FireScam infostealer poses as Telegram Premium app to surveil Android devices – Source: go.theregister.com
·
Jan 7, 2025
←
Previous Page
1
…
54
55
56
57
58
…
2,056
Next Page
→
Search
Archive
January 2025
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
Categories
Uncategorized
Recent Posts
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
January 16, 2025
Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager
January 16, 2025
Microsoft: Happy 2025. Here’s 161 Security Updates – Source: krebsonsecurity.com
January 15, 2025
CISA Launches Playbook to Boost AI Cybersecurity Collaboration – Source: www.infosecurity-magazine.com
January 15, 2025
Chinese PlugX Malware Deleted in Global Law Enforcement Operation – Source: www.infosecurity-magazine.com
January 15, 2025
Tags
Social Links
Facebook
Twitter
LinkedIn
Instagram