Double Pulsar
CitrixBleed 2: Electric Boogaloo — CVE-2025–5777
2 weeks 4 days ago
Kevin Beaumont
Big Game Ransomware: the myths experts tell board members
2 months 1 week ago
Kevin Beaumont
DragonForce Ransomware Cartel attacks on UK high street retailers: walking in the front door
2 months 1 week ago
Kevin Beaumont
Microsoft’s patch for CVE-2025–21204 symlink vulnerability introduces another symlink vulnerability
2 months 2 weeks ago
Kevin Beaumont
Microsoft Recall on Copilot+ PC: testing the security and privacy implications
2 months 3 weeks ago
Kevin Beaumont
Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service
3 months 1 week ago
Kevin Beaumont
No, there isn’t a world ending Apache Camel vulnerability
4 months ago
Kevin Beaumont
Use one Virtual Machine to own them all — active exploitation of ESXicape
4 months 1 week ago
Kevin Beaumont
2022 zero day was used to raid Fortigate firewall configs. Somebody just released them.
5 months 4 weeks ago
Kevin Beaumont
Handala attempts a supply chain hack via ReutOne
6 months 2 weeks ago
Kevin Beaumont
Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs
8 months 3 weeks ago
Kevin Beaumont
EIW — ESET Israel Wiper — used in active attacks targeting Israeli orgs
8 months 3 weeks ago
Kevin Beaumont
Hacker group Handala Hack Team claim battery explosions linked to Israeli battery company.
9 months 3 weeks ago
Kevin Beaumont
CrowdStrike trying to use legal threats to suppress criticism and parody of global IT outage
11 months 1 week ago
Kevin Beaumont
Microsoft need to be transparent about customer impacting DDoS attacks
11 months 1 week ago
Kevin Beaumont
What I learned from the ‘Microsoft global IT outage’
11 months 3 weeks ago
Kevin Beaumont
Snowflake at centre of world’s largest data breach
1 year 1 month ago
Kevin Beaumont
Recall: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible.
1 year 1 month ago
Kevin Beaumont
How the new Microsoft Recall feature fundamentally undermines Windows security
1 year 1 month ago
Kevin Beaumont
Checked
11 hours 43 minutes ago

Cybersecurity from the trenches, written by Kevin Beaumont. Opinions are of the author alone, not their employer. - Medium
Double Pulsar feed