Posts
2024 - 12
- Cleo Software Exploitation Highlights Need for Cybersecurity Improvements
- Cozy Bear Cyber Threat Group Overview and Defense Strategies
- Critical Vulnerabilities Found in Ruijie Cloud Management Platform
- Critical Vulnerability Discovered in Citrix NetScaler RDP Proxy
- CVE-2024-44131: TCC Bypass Vulnerability Discovered in Apple Systems
- Emergence of Salt Typhoon as a Cyber Threat
- Cybersecurity Strategies for 2025: Addressing Emerging Threats
- GitLab Issues Security Advisory for Multiple Vulnerabilities
- Implementing FIDO2 for Passwordless Authentication in Java Spring Boot
- Increase in Phishing Attempts Targeting Okta Users
- Kudelski Security Reports on Social Engineering Threats
- New USB HID Fuzzing Tools Enhance Cybersecurity Testing