|
You are here |
foxglovesecurity.com | ||
| | | | |
www.modzero.ch
|
|
| | | | | ||
| | | | |
theori.io
|
|
| | | | | Four critical RCE vulnerabilities (CVE-2024-36072 to CVE-2024-36075) in CoSoSys Endpoint Protector were identified, allowing full server and client compromise. Read the full analysis. | Web2 Security | |
| | | | |
blog.redcrowlab.com
|
|
| | | | | Much of the time people engage in short term security testing such as penetration tests, vulnerability assessments, code reviews, etc. Often these are 1-2 weeks with some period for reporting. The approach to conducting these sorts of projects typically includes the following types of steps: * Heavy reliance on automated tools | |
| | | | |
www.seqrite.com
|
|
| | | Seqrite Labs uncovers Silent Lynx, a new APT group targeting government entities in Kyrgyzstan and neighboring nations. This in-depth analysis explores their campaigns, including malicious ISO files, C++ loaders, PowerShell scripts, and Golang implants, leveraging Telegram for command and control. | ||