Double Pulsar
No, there isn’t a world ending Apache Camel vulnerability
3 weeks 3 days ago
Kevin Beaumont
Use one Virtual Machine to own them all — active exploitation of ESXicape
4 weeks ago
Kevin Beaumont
2022 zero day was used to raid Fortigate firewall configs. Somebody just released them.
2 months 2 weeks ago
Kevin Beaumont
Handala attempts a supply chain hack via ReutOne
3 months ago
Kevin Beaumont
Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs
5 months 1 week ago
Kevin Beaumont
EIW — ESET Israel Wiper — used in active attacks targeting Israeli orgs
5 months 2 weeks ago
Kevin Beaumont
Hacker group Handala Hack Team claim battery explosions linked to Israeli battery company.
6 months 1 week ago
Kevin Beaumont
CrowdStrike trying to use legal threats to suppress criticism and parody of global IT outage
7 months 4 weeks ago
Kevin Beaumont
Microsoft need to be transparent about customer impacting DDoS attacks
8 months ago
Kevin Beaumont
What I learned from the ‘Microsoft global IT outage’
8 months 1 week ago
Kevin Beaumont
Snowflake at centre of world’s largest data breach
10 months ago
Kevin Beaumont
Recall: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible.
10 months ago
Kevin Beaumont
How the new Microsoft Recall feature fundamentally undermines Windows security
10 months 1 week ago
Kevin Beaumont
Breaking down Microsoft’s pivot to placing cybersecurity as a top priority
10 months 4 weeks ago
Kevin Beaumont
Delinea has cloud security incident in Thycotic Secret Server gaff
11 months 2 weeks ago
Kevin Beaumont
Inside the failed attempt to backdoor SSH globally — that got caught by chance
1 year ago
Kevin Beaumont
How 50% of telco Orange Spain’s traffic got hijacked — a weak password
1 year 2 months ago
Kevin Beaumont
Checked
10 hours 21 minutes ago

Cybersecurity from the trenches, written by Kevin Beaumont. Opinions are of the author alone, not their employer. - Medium
Double Pulsar feed