Double Pulsar
CitrixBleed 2 exploitation started mid-June — how to spot it
2 weeks 3 days ago
Kevin Beaumont
CitrixBleed 2: Electric Boogaloo — CVE-2025–5777
1 month ago
Kevin Beaumont
Big Game Ransomware: the myths experts tell board members
2 months 3 weeks ago
Kevin Beaumont
DragonForce Ransomware Cartel attacks on UK high street retailers: walking in the front door
2 months 3 weeks ago
Kevin Beaumont
Microsoft’s patch for CVE-2025–21204 symlink vulnerability introduces another symlink vulnerability
3 months ago
Kevin Beaumont
Microsoft Recall on Copilot+ PC: testing the security and privacy implications
3 months ago
Kevin Beaumont
Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service
3 months 3 weeks ago
Kevin Beaumont
No, there isn’t a world ending Apache Camel vulnerability
4 months 2 weeks ago
Kevin Beaumont
Use one Virtual Machine to own them all — active exploitation of ESXicape
4 months 2 weeks ago
Kevin Beaumont
2022 zero day was used to raid Fortigate firewall configs. Somebody just released them.
6 months 1 week ago
Kevin Beaumont
Handala attempts a supply chain hack via ReutOne
6 months 4 weeks ago
Kevin Beaumont
Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs
9 months ago
Kevin Beaumont
EIW — ESET Israel Wiper — used in active attacks targeting Israeli orgs
9 months 1 week ago
Kevin Beaumont
Hacker group Handala Hack Team claim battery explosions linked to Israeli battery company.
10 months ago
Kevin Beaumont
CrowdStrike trying to use legal threats to suppress criticism and parody of global IT outage
11 months 2 weeks ago
Kevin Beaumont
Microsoft need to be transparent about customer impacting DDoS attacks
11 months 3 weeks ago
Kevin Beaumont
What I learned from the ‘Microsoft global IT outage’
1 year ago
Kevin Beaumont
Snowflake at centre of world’s largest data breach
1 year 1 month ago
Kevin Beaumont
Recall: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible.
1 year 1 month ago
Kevin Beaumont
Checked
8 minutes 20 seconds ago

Cybersecurity from the trenches, written by Kevin Beaumont. Opinions are of the author alone, not their employer. - Medium
Double Pulsar feed