Xander.Ritt@gmail.com
Valdosta, GA
LinkedIn
Home
About
News
Blog
Contact me!
September 2024
Uncategorized
USENIX Security ’23 – William E. Bodell III, Sajad Meisami, Yue Duan – Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains – Source: securityboulevard.com
·
Feb 22, 2024
Uncategorized
How Schools Can Comply with the Three Biggest Online Student Privacy Laws – Source: securityboulevard.com
·
Feb 22, 2024
Uncategorized
Threat Hunting Workshop 10: Hunting for Initial Access – Source: securityboulevard.com
·
Feb 22, 2024
Uncategorized
What to Look for in a Secrets Scanner – Source: securityboulevard.com
·
Feb 22, 2024
Uncategorized
CISA Mitigation Guide for Healthcare Organizations: Part Three – Source: securityboulevard.com
·
Feb 22, 2024
Uncategorized
Joomla fixes XSS flaws that could expose sites to RCE attacks – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
Microsoft expands free logging capabilities after May breach – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
Hackers abuse Google Cloud Run in massive banking trojan campaign – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
Fraudsters tried to scam Apple out of 5,000 iPhones worth over $3 million – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
New SSH-Snake malware steals SSH keys to spread across the network – Source: www.bleepingcomputer.com
·
Feb 22, 2024
←
Previous Page
1
…
1,949
1,950
1,951
1,952
1,953
…
2,070
Next Page
→
Search
Archive
January 2025
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
Categories
Uncategorized
Recent Posts
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation – Source:thehackernews.com
January 17, 2025
Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation – Source:thehackernews.com
January 17, 2025
How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? – Source:thehackernews.com
January 17, 2025
U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs – Source:thehackernews.com
January 17, 2025
New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass – Source:thehackernews.com
January 17, 2025
Tags
Social Links
Facebook
Twitter
LinkedIn
Instagram