Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances NCSC Feed
[webapps] SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) Exploit-DB.com
International Civil Aviation Organization (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists Security Affairs
SlackPirate Set Sails Again! Or: How to Send the Entire “Bee Movie” Script to Your Friends in Slack Posts By SpecterOps Team Members - Medium
Insurance companies can reduce risk with Attack Path Management Posts By SpecterOps Team Members - Medium
Red Siege at Wild West Hackin’ Fest Mile High 2025 – What to Expect! Blog – Red Siege Information Security
Bug Bounty Radar // The latest bug bounty programs for March 2023 The Daily Swig | Cybersecurity news and views
Indian transport ministry flaws potentially allowed creation of counterfeit driving licenses The Daily Swig | Cybersecurity news and views
State-backed attackers and commercial surveillance vendors repeatedly use the same exploits Threat Analysis Group (TAG)