Xander.Ritt@gmail.com
Valdosta, GA
LinkedIn
Home
About
News
Blog
Contact me!
December 2024
Uncategorized
CISA Mitigation Guide for Healthcare Organizations: Part Three – Source: securityboulevard.com
·
Feb 22, 2024
Uncategorized
Joomla fixes XSS flaws that could expose sites to RCE attacks – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
Microsoft expands free logging capabilities after May breach – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
Hackers abuse Google Cloud Run in massive banking trojan campaign – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
Fraudsters tried to scam Apple out of 5,000 iPhones worth over $3 million – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
New SSH-Snake malware steals SSH keys to spread across the network – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
US govt shares cyberattack defense tips for water utilities – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
ScreenConnect critical bug now under attack as exploit code emerges – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
US offers $15 million bounty for info on LockBit ransomware gang – Source: www.bleepingcomputer.com
·
Feb 22, 2024
Uncategorized
U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders
·
Feb 22, 2024
←
Previous Page
1
…
1,950
1,951
1,952
1,953
1,954
…
2,070
Next Page
→
Search
Archive
January 2025
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
Categories
Uncategorized
Recent Posts
Weekly IT Vulnerability Report: Critical Updates for SAP, Microsoft, Fortinet, and Others – Source:cyble.com
January 17, 2025
Sliver Implant Targets German Entities with DLL Sideloading and Proxying Techniques – Source:cyble.com
January 17, 2025
AI Takes the Center Stage in Biden’s Landmark Cybersecurity Order – Source:cyble.com
January 17, 2025
Mercedes-Benz Head Unit security research report – Source: securelist.com
January 17, 2025
Leveraging Behavioral Insights to Counter LLM-Enabled Hacking – Source: www.darkreading.com
January 17, 2025
Tags
Social Links
Facebook
Twitter
LinkedIn
Instagram