Explore >> Select a destination


You are here

www.koi.security
| | www.sysdig.com
3.2 parsecs away

Travel
| | A new supply chain attack against the NPM repository is using novel, self-propagating malware (also known as a worm) to continue spreading itself.
| | www.sonatype.com
3.9 parsecs away

Travel
| | Learn about a new, targeted backdoor supply chain attack against the popular XZ compression utility seen in many Linux distributions such as fedora and debian. Understand its impact, potential risks and what you can do about it.
| | www.reversinglabs.com
3.7 parsecs away

Travel
| | Software tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know.
| | 0xdf.gitlab.io
22.3 parsecs away

Travel
| Active was an example of an easy box that still provided a lot of opportunity to learn. The box was centered around common vulnerabilities associated with Active Directory. There's a good chance to practice SMB enumeration. It also gives the opportunity to use Kerberoasting against a Windows Domain, which, if you're not a pentester, you may not have had the chance to do before.