Double Pulsar
CitrixBleed 2 situation update — everybody already got owned
1 month 1 week ago
Kevin Beaumont
CitrixBleed 2 exploitation started mid-June — how to spot it
1 month 2 weeks ago
Kevin Beaumont
CitrixBleed 2: Electric Boogaloo — CVE-2025–5777
2 months ago
Kevin Beaumont
Big Game Ransomware: the myths experts tell board members
3 months 3 weeks ago
Kevin Beaumont
DragonForce Ransomware Cartel attacks on UK high street retailers: walking in the front door
3 months 3 weeks ago
Kevin Beaumont
Microsoft’s patch for CVE-2025–21204 symlink vulnerability introduces another symlink vulnerability
4 months ago
Kevin Beaumont
Microsoft Recall on Copilot+ PC: testing the security and privacy implications
4 months ago
Kevin Beaumont
Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service
4 months 3 weeks ago
Kevin Beaumont
No, there isn’t a world ending Apache Camel vulnerability
5 months 2 weeks ago
Kevin Beaumont
Use one Virtual Machine to own them all — active exploitation of ESXicape
5 months 3 weeks ago
Kevin Beaumont
2022 zero day was used to raid Fortigate firewall configs. Somebody just released them.
7 months 1 week ago
Kevin Beaumont
Handala attempts a supply chain hack via ReutOne
8 months ago
Kevin Beaumont
Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs
10 months ago
Kevin Beaumont
EIW — ESET Israel Wiper — used in active attacks targeting Israeli orgs
10 months 1 week ago
Kevin Beaumont
Hacker group Handala Hack Team claim battery explosions linked to Israeli battery company.
11 months 1 week ago
Kevin Beaumont
CrowdStrike trying to use legal threats to suppress criticism and parody of global IT outage
1 year ago
Kevin Beaumont
Microsoft need to be transparent about customer impacting DDoS attacks
1 year ago
Kevin Beaumont
What I learned from the ‘Microsoft global IT outage’
1 year 1 month ago
Kevin Beaumont
Snowflake at centre of world’s largest data breach
1 year 2 months ago
Kevin Beaumont
Checked
5 hours 12 minutes ago

Cybersecurity from the trenches, written by Kevin Beaumont. Opinions are of the author alone, not their employer. - Medium
Double Pulsar feed