1Numerous orgs hacked after installing weaponized open source apps (opens in new tab)(arstechnica.com)2rmdoss3y ago1
3Log analysis: Detecting new attacks by watching your 404 error logs (opens in new tab)(trunc.org)1rmdoss3y ago0
4Discovering Domains via a Timing Attack on Certificate Transparency (opens in new tab)(swarm.ptsecurity.com)1rmdoss3y ago0
52022 attacks An August reading list to go “Shields Up" (opens in new tab)(blog.cloudflare.com)2rmdoss3y ago0
6Investigating a hacked WordPress site on Linode being used as a DDoS relay (opens in new tab)(trunc.org)4rmdoss3y ago1
7Arris / Arris-variant DSL/Fiber router critical vulnerability exposure (opens in new tab)(derekabdine.com)101rmdoss3y ago34
9DDoS analysis – 7k IPs generating 30k requests per second (opens in new tab)(trunc.org)5rmdoss3y ago0
10Did You Know the Browser’s Autofill Credentials Could Be Stolen via XSS (opens in new tab)(gosecure.net)1rmdoss3y ago1
13Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found in the wild (opens in new tab)(decoded.avast.io)140rmdoss3y ago54
14Network analysis of a targeted phish that got past Defender (opens in new tab)(derant.com)1rmdoss3y ago0
15Vulnerability in Gitlab: Sending Arbitrary Requests Through Jupyter Notebooks (opens in new tab)(liman.io)3rmdoss3y ago0