Double Pulsar
Use one Virtual Machine to own them all — active exploitation of ESXicape
2 weeks 3 days ago
Kevin Beaumont
2022 zero day was used to raid Fortigate firewall configs. Somebody just released them.
2 months ago
Kevin Beaumont
Handala attempts a supply chain hack via ReutOne
2 months 3 weeks ago
Kevin Beaumont
Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs
4 months 4 weeks ago
Kevin Beaumont
EIW — ESET Israel Wiper — used in active attacks targeting Israeli orgs
5 months ago
Kevin Beaumont
Hacker group Handala Hack Team claim battery explosions linked to Israeli battery company.
6 months ago
Kevin Beaumont
CrowdStrike trying to use legal threats to suppress criticism and parody of global IT outage
7 months 2 weeks ago
Kevin Beaumont
Microsoft need to be transparent about customer impacting DDoS attacks
7 months 3 weeks ago
Kevin Beaumont
What I learned from the ‘Microsoft global IT outage’
7 months 4 weeks ago
Kevin Beaumont
Snowflake at centre of world’s largest data breach
9 months 2 weeks ago
Kevin Beaumont
Recall: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible.
9 months 3 weeks ago
Kevin Beaumont
How the new Microsoft Recall feature fundamentally undermines Windows security
10 months ago
Kevin Beaumont
Breaking down Microsoft’s pivot to placing cybersecurity as a top priority
10 months 2 weeks ago
Kevin Beaumont
Delinea has cloud security incident in Thycotic Secret Server gaff
11 months 1 week ago
Kevin Beaumont
Inside the failed attempt to backdoor SSH globally — that got caught by chance
11 months 3 weeks ago
Kevin Beaumont
How 50% of telco Orange Spain’s traffic got hijacked — a weak password
1 year 2 months ago
Kevin Beaumont
Checked
3 hours 1 minute ago

Cybersecurity from the trenches, written by Kevin Beaumont. Opinions are of the author alone, not their employer. - Medium
Double Pulsar feed