Xander.Ritt@gmail.com
Valdosta, GA
LinkedIn
Home
About
News
Blog
Contact me!
December 2024
Uncategorized
Holiday Shopping Meets Cyber Threats: How Source Defense Detected the ESA Store Attack – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
Randall Munroe’s XKCD ‘Skew-T Log-P’ – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
Sonatype customers leading with innovation in the new year – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
DEF CON 32 – Physical OSINT – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
WordPress Plugin Exploited to Turn Legitimate Sites Into Phishing Traps – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
How a Global Insurer Protects Customer Data & Achieves Compliance With DataDome – Source: securityboulevard.com
·
Jan 7, 2025
Uncategorized
Charter, Consolidated, Windstream reportedly join China’s Salt Typhoon victim list – Source: go.theregister.com
·
Jan 7, 2025
Uncategorized
FireScam infostealer poses as Telegram Premium app to surveil Android devices – Source: go.theregister.com
·
Jan 7, 2025
Uncategorized
MediaTek rings in the new year with a parade of chipset vulns – Source: go.theregister.com
·
Jan 7, 2025
Uncategorized
After China’s Salt Typhoon, the reconstruction starts now – Source: go.theregister.com
·
Jan 7, 2025
←
Previous Page
1
…
55
56
57
58
59
…
2,057
Next Page
→
Search
Archive
January 2025
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
Categories
Uncategorized
Recent Posts
Your Ultimate Guide to NIS2 Compliance: Key Steps and Insights – Source: heimdalsecurity.com
January 16, 2025
Head of US Cybersecurity Agency Says She Hopes It Keeps up Election Work Under Trump – Source: www.securityweek.com
January 16, 2025
FBI Uses Malware’s Own ‘Self-Delete’ Trick to Erase Chinese PlugX From US Computers – Source: www.securityweek.com
January 16, 2025
DORA’s Deadline Looms: Navigating the EU’s Mandate for Threat Led Penetration Testing – Source: www.securityweek.com
January 16, 2025
Cyber Insights 2025: Open Source and Software Supply Chain Security – Source: www.securityweek.com
January 16, 2025
Tags
Social Links
Facebook
Twitter
LinkedIn
Instagram