Xander.Ritt@gmail.com
Valdosta, GA
LinkedIn
Home
About
News
Blog
Contact me!
August 2024
Uncategorized
MediaTek rings in the new year with a parade of chipset vulns – Source: go.theregister.com
·
Jan 7, 2025
Uncategorized
After China’s Salt Typhoon, the reconstruction starts now – Source: go.theregister.com
·
Jan 7, 2025
Uncategorized
Message Queues vs. Streaming Systems: Key Differences and Use Cases – Source: socprime.com
·
Jan 7, 2025
Uncategorized
What is Event Streaming in Apache Kafka? – Source: socprime.com
·
Jan 7, 2025
Uncategorized
NonEuclid RAT Detection: Malware Enables Adversaries to Gain Unauthorized Remote Access and Control Over a Targeted System – Source: socprime.com
·
Jan 7, 2025
Uncategorized
Privacy of Photos.app’s Enhanced Visual Search – Source: www.schneier.com
·
Jan 7, 2025
Uncategorized
Nessus scanner agents went offline due to a faulty plugin update – Source: securityaffairs.com
·
Jan 6, 2025
Uncategorized
China-linked Salt Typhoon APT compromised more US telecoms than previously known – Source: securityaffairs.com
·
Jan 6, 2025
Uncategorized
PLAYFULGHOST backdoor supports multiple information stealing features – Source: securityaffairs.com
·
Jan 6, 2025
Uncategorized
New PhishWP Plugin on Russian Forum Turns Sites into Phishing Pages – Source:hackread.com
·
Jan 6, 2025
←
Previous Page
1
…
55
56
57
58
59
…
2,056
Next Page
→
Search
Archive
January 2025
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
Categories
Uncategorized
Recent Posts
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
January 16, 2025
Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager
January 16, 2025
Microsoft: Happy 2025. Here’s 161 Security Updates – Source: krebsonsecurity.com
January 15, 2025
CISA Launches Playbook to Boost AI Cybersecurity Collaboration – Source: www.infosecurity-magazine.com
January 15, 2025
Chinese PlugX Malware Deleted in Global Law Enforcement Operation – Source: www.infosecurity-magazine.com
January 15, 2025
Tags
Social Links
Facebook
Twitter
LinkedIn
Instagram