[menu]

XBPT's Security Watch

February 2026

02
Advancing Windows security: Disabling NTLM by default
02
Notepad++ Hijacked by State-Sponsored Hackers
02
1-Click RCE To Steal Your Moltbot Data and Keys
02
Trump Administration Rescinds Biden-Era Software Guidance

January 2026

30
Barbhack 2025 CTF
30
How AI coding is breathing new life into Rust
30
Defeating Anti-Reverse Engineering: A Deep Dive into the 'Trouble' Binary
30
AI Agents vs Humans: Who Wins at Web Hacking in 2026?
30
HTB: JobTwo
27
Bypassing Windows Administrator Protection
27
AWS European Sovereign Cloud: Digital sovereignty or sophisticated marketing?
27
HTB: Job
25
Commission strengthens EU cybersecurity resilience and capabilities
25
Europe's GCVE Raises Concerns Over Fragmentation in Vulnerability Databases
25
GCVE Announces the Launch of db.gcve.eu: A New Open Public Vulnerability Advisory Database
25
HTB: Imagery
25
GNU InetUtils Security Advisory: remote authentication by-pass in telnetd
23
Curl ending bug bounty program after flood of AI slop reports
23
Watering Hole Attack Targets EmEditor Users with Information-Stealing Malware
23
Rust’s Role in Embedded Security
20
Proc Filesystem
18
AI models are showing a greater ability to find and exploit vulnerabilities on realistic cyber ranges
18
Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation
18
Escaping the Vulnerability Management Hamster Wheel
18
HTB: HackNet
16
WIRELESS-(IN)FIDELITY: PENTESTING WI-FI IN 2025
16
Introducing ÆSIR: Finding Zero-Day Vulnerabilities at the Speed of AI
16
Drone Hacking Part 1: Dumping Firmware and Bruteforcing ECC
15
Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
15
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
15
Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws
14
UNVEILING VOIDLINK – A STEALTHY, CLOUD-NATIVE LINUX MALWARE FRAMEWORK
14
The Great VM Escape: ESXi Exploitation in the Wild
13
Hacker gets seven years for breaching Rotterdam and Antwerp ports
12
HTB: Previous
11
OWASP Top 10 2025 – A Pentester’s Perspective
06
SANS Holiday Hack Challenge 2025: Revenge of the Gnome(s)
05
The Cloud Kill Switch: how Europe’s digital dependence became a Single Point of Failure
02
The biggest cybersecurity and cyberattack stories of 2025
01
Flagvent 2025

December 2025

31
Cybersecurity Predictions 2026: An AI Arms Race and Malware Autonomy
30
European Space Agency confirms breach of "external servers"
30
Glue employees hold teams together
30
39C3: Multiple vulnerabilities in GnuPG and other cryptographic tools
28
When risk fragments, cybersecurity strategy stalls
26
As More Coders Adopt AI Agents, Security Pitfalls Lurk in 2026
25
Silver Fox Targeting India Using Tax Themed Phishing Lures
24
Industry Continues to Push Back on HIPAA Security Rule Overhaul
24
Making NIS 2 reviews work in real life
24
Block all AI browsers for the foreseeable future: Gartner
23
Cyberattack knocks offline France's postal, banking services
22
CVE-2025-7771: Exploiting a Signed Kernel Driver in a Red Team Operation
21
Airbus to migrate critical apps to a sovereign Euro cloud
20
A Good Year for North Korean Cybercriminals
20
Dismantling Defenses: Trump 2.0 Cyber Year in Review
19
A Series of Unfortunate (RMM) Events
19
Introducing Pathfinding.cloud
18
Cybersecurity Framework Profile for Artificial Intelligence (Cyber AI Profile): NIST Community Profile
17
Welcome to the new Project Zero Blog
17
The Detection & Response Chronicles: Exploring Telegram Abuse
15
Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing
15
A very unscientific guide to the security of various PQC algorithms
15
How we got hit by Shai-Hulud: A complete post-mortem
14
HTB: WhiteRabbit
14
A look at an Android ITW DNG exploit
13
SOAPwn: Pwning .NET Framework Applications Through HTTP Client Proxies And WSDL
13
MITRE shares 2025's top 25 most dangerous software weaknesses
13
Abusing DLLs EntryPoint for the Fun
13
Git SCOMmit – Putting the Ops in OpsMgr
12
Beyond RC4 for Windows authentication
11
Microsoft Patch Tuesday 2025 Year in Review
11
Donating the Model Context Protocol and establishing the Agentic AI Foundation
11
EU-US Data Transfers: Time to prepare for more trouble to come
11
Packer-as-a-Service Shanya Hides Ransomware, Kills EDR
11
Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flaws
11
CISOs Should Be Asking These Quantum Questions Today
07
Introducing X-Force Malware Threat Research public Github repository
05
Cloudflare blames today's outage on React2Shell mitigations
05
FORGET METASPLOIT: INSIDE PREDATOR’S ZERO-CLICK ADVERTISING-DRIVEN PHONE HACKING SYSTEM
05
Cybersecurity strategies to prioritize now​​
05
New eBPF Filters for Symbiote and BPFdoor Malware
05
Critical Advisory: Remote Code Execution in Next.js (CVE-2025-66478) with Working Exploit
04
Smile, You’re on Camera: A Live Stream from Inside Lazarus Group’s IT Workers Scheme
04
5 Threats That Reshaped Web Security This Year [2025]
04
Microsoft "mitigates" Windows LNK flaw exploited as zero-day
03
Researchers Use Poetry to Jailbreak AI Models
03
Cyber Brief 25-12 - November 2025

November 2025

27
BREAKING THE BEESTATION: INSIDE OUR PWN2OWN 2025 EXPLOIT JOURNEY
26
With Friends Like These: China Spies on Russian IT Orgs
26
Mobile phones : Threat landscape since 2015
26
Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
25
Another Shai-Hulud npm worm is spreading. Here’s what you need to know.
22
HTB: Mirage
21
Stepping up our role in Vulnerability Management: ENISA Becomes CVE Root
21
Digital Omnibus Regulation Proposal
21
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks
19
Bitcoin Core audit
19
Understanding the future of offensive AI in cybersecurity
19
Software quality's collapse: How AI is accelerating decline
19
When security becomes the systemic risk: lessons from the Cloudflare outage
19
Cloudflare outage on November 18, 2025
19
Strategic disconnection: a guide to effective leadership
19
Native Sysmon functionality coming to Windows
17
Cat’s Got Your Files: Lynx Ransomware
14
Suspected Fortinet Zero Day Exploited in the Wild
14
When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security
14
Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws
11
OWASP Top 10:2025 (Release Candidate)
11
How organizations can adopt AI security tools without losing control
10
X-Force Threat Analysis Report: LATAM baited into the delivery of PureHVNC
09
NVISO analyzes VShell post-exploitation tool
09
LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices
09
HTB: RustyKey
09
A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
09
Europe Sees Increase in Ransomware, Extortion Attacks
09
​​Securing critical infrastructure: Why Europe’s risk-based regulations matter
08
Defeating KASLR by Doing Nothing at All
08
The dangerous confidence gap in corporate cybersecurity
08
HTB: Dump
08
How PowerShell Gallery simplifies attacks
08
Beyond incident response: measuring what never happened
08
CREATING A "TWO-FACE" RUST BINARY ON LINUX
08
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
02
Chat control proposal fails again after massive public opposition
02
HTB: Voleur
01
UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities
01
Automating COM/DCOM vulnerability research

October 2025

31
CISA, NSA and Global Partners Unveil Security Blueprint for Hardening Microsoft Exchange Servers
31
Why Signal’s post-quantum makeover is an amazing engineering achievement
31
HTB: Store
31
How to collect memory-only filesystems on Linux systems
31
Keys to the Kingdom: A Defender's Guide to Privileged Account Monitoring
31
Epic Pentest Fail
28
CyFun® 2025 is here!
28
The Problem with Parsing Linux-Based Memory Dumps
28
Ransomware profits drop as victims stop paying hackers
28
Hack-cessibility: When DLL Hijacks Meet Windows Helpers
28
ATT&CK v18: The Detection Overhaul You’ve Been Waiting For
27
Cloud Sovereignty Framework
25
Secure Configuration and Hardening of Active Directory Certificate Services
24
Catching Credential Guard Off Guard
23
Why You Should Swap Passwords for Passphrases
23
Migration to post-quantum cryptography
22
Spyware maker NSO Group confirms acquisition by US investors
21
DNS0.EU private DNS service shuts down over sustainability issues
21
Inside the attack chain: Threat activity targeting Azure Blob Storage
21
EU Consistently Targeted By Diverse Yet Convergent Threat Groups
21
To Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVER
19
A Surprising Amount of Satellite Traffic Is Unencrypted
19
HTB: DarkCorp
17
UNITED STATES SECURITIES AND EXCHANGE COMMISSION, FORM 8-K, F5 INC
16
New Group on the Block: UNC5142 Leverages EtherHiding to Distribute Malware
16
Microsoft: Office 2016 and Office 2019 have reach end of support
16
F5 says hackers stole undisclosed BIG-IP flaws, source code
16
Hacking the World Poker Tour: Inside ClubWPT Gold’s Back Office
15
Microsoft Drops Terrifyingly Large October Patch Update
15
Vibe coding in production: 5 security lessons
15
Final Windows 10 Patch Tuesday update rolls out as support ends
15
Microsoft: Exchange 2016 and 2019 have reached end of support
15
Microsoft’s October 2025 Patch Tuesday Addresses 167 CVEs (CVE-2025-24990, CVE-2025-59230)
15
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
14
SimonMed says 1.2 million patients impacted in January data breach
14
Securing the Future: Changes to Internet Explorer Mode in Microsoft Edge
12
HTB: Tombwatcher
12
Why ‘security as by-product’ is no replacement for modern tooling
12
Vulnerability Management – Requirements, Scoping & Target Setting
12
Red Hat Hackers Team Up With Scattered Lapsus$ Hunters
12
HTB: Watcher
11
MEDICAL DEVICE SECURITY ANALYSIS
11
Investigating targeted “payroll pirate” attacks affecting US universities
09
Security Concerns Shadow Vibe Coding Adoption
09
New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise
09
Disrupting threats targeting Microsoft Teams
06
Paged Out! #7 is out!
06
The History of Active Directory Security
06
HTB: Certificate
04
Signal Protocol and Post-Quantum Ratchets
04
Building AI for cyber defenders
04
Red Hat confirms security incident after hackers breach GitLab instance
02
Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite
02
China Imposes One-Hour Reporting Rule for Major Cyber Incidents

September 2025

30
From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion
29
Digital Threat Modeling Under Authoritarianism
29
Pointer leaks through pointer-keyed data structures
27
Domino Effect: How One Vendor's AI App Breach Toppled Giants
27
Securing Microsoft Entra ID: Lessons from the Field – Part 1
27
Microsoft will offer free Windows 10 extended security updates in Europe
24
Average Cost of a Data Breach
24
Brussels Airport Paralysed: Are You Ready for the Next Supply Chain Cyber Crisis?
23
Airport Chaos Shows Human Impact of 3rd-Party Attacks
23
PHP Documentation Audit Complete!
23
New EDR-Freeze tool uses Windows WER to suspend security software
19
H1 x HTB (AI_GON3_ROGU3) : Writeup
18
Scattered Lapsus$ Hunters,' Others Announce End of Hacking Spree
18
Self-Replicating 'Shai-hulud' Worm Targets NPM Packages
17
Microsoft seizes 338 websites to disrupt rapidly growing ‘RaccoonO365’ phishing service
16
Microsoft: WMIC will be removed after Windows 11 25H2 upgrade
16
DISSECTING DCOM PARTIE 1
12
Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days
11
How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
11
Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
11
THIS SUPPLY CHAIN HACK PROVES ONE MAINTAINER CAN BREAK EVERYTHING
11
What’s Your Cybersecurity Maturity?
09
Deepfake North Korean Remote Workers: a New Data Loss Threat
09
Salt Typhoon and UNC4841: Silent Push Discovers New Domains; Urges Defenders to Check Telemetry and Log Data
09
Czech cyber agency warns against Chinese tech in critical infrastructure
09
How the NTFS USN Journal Powers DFIR Investigations
09
Azure mandatory multifactor authentication: Phase 2 starting in October 2025
09
Russian APT28 Deploys "NotDoor" Outlook Backdoor Against Companies in NATO Countries
09
HTB: Media
09
Why Threat Hunting Should Be Part of Every Security Program
03
You Can't Find Weird If You Don't Know Normal
03
NIST Revises Security and Privacy Control Catalog to Improve Software Update and Patch Releases
03
HTB: Race
03
HTB: Eureka
03
Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE

August 2025

29
Google previews cyber ‘disruption unit’ as U.S. government, industry weigh going heavier on offense
29
IBM X-Force Threat Analysis: QuirkyLoader - A new malware loader delivering infostealers and RATs
29
Loophole allows threat actors to claim VS Code extension names
29
HTB: Sendai
29
Velociraptor incident response tool abused for remote access
29
ESET discovers PromptLock, the first AI-powered ransomware
29
NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations
26
ENISA to operate the EU Cybersecurity Reserve with EUR 36 million
25
Reading Location Position Value in Microsoft Word Documents
25
HTB: TheFrizz
25
Staffing strategies for an effective SOC
25
The Silent, Fileless Threat of VShell
22
Less than half of Belgian companies use the most basic security measures!
22
CYCON 2025 SERIES – DECIDING WITH AI SYSTEMS: RETHINKING DYNAMICS IN MILITARY DECISION-MAKING
21
Quantum-safe security: Progress towards next-generation cryptography
21
Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware
21
HTB: Phantom
19
Phrack 72
18
Dissecting PipeMagic: Inside the architecture of a modular backdoor framework
18
Wazuh for Regulatory Compliance
15
Water Systems Under Attack: Norway, Poland Blame Russia Actors
15
Using Security Expertise to Bridge the Communication Gap
14
Cybersecurity Spending Slows & Security Teams Shrink
14
HTB: Sweep
14
#TROOPERS25 AD & Entra ID Security Track
13
Microsoft August 2025 Patch Tuesday fixes one zero-day, 107 flaws
12
Shedding Light on PoisonSeed’s Phishing Kit
12
New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises
12
HTB: Zero
12
North Korean Kimsuky hackers exposed in alleged data breach
11
Every Reason Why I Hate AI and You Should Too
11
Will Secure AI Be the Hottest Career Path in Cybersecurity?
11
Debian 13 "Trixie" Released: What’s New in the Latest Version?
10
Tabletop exercises in cybersecurity: what they are, why they matter, and how to run one
09
Ransomware Attacks Fall by Almost Half in Q2
09
Before you build, break it on paper
09
From Chrome renderer code exec to kernel with MSG_OOB
09
Prompt injection engineering for attackers: Exploiting GitHub Copilot
09
Data Dump From APT Actor Yields Clues to Attacker Capabilities
08
ChatGPT's GPT-5 models released: everything you need to know
08
HTB: Rainbow
07
Dissecting the CastleBot Malware-as-a-Service operation
07
Microsoft warns of high-severity flaw in hybrid Exchange deployments
07
HTB: Build
07
Sharing practical guidance: Launching Microsoft Secure Future Initiative (SFI) patterns and practices
06
Introducing gpt-oss
06
Project Ire autonomously identifies malware at scale
06
Ranking the top threats and techniques for the first half of 2025
06
Your security team studies while hackers learn
05
New Tallinn Paper analysis Russian cyber agression and proposes ways to strengthen Europe’s cyber defence
04
First Sentencing in Scheme to Help North Koreans Infiltrate US Companies

July 2025

31
CISA open-sources Thorium platform for malware, forensic analysis
31
HTB: LustrousTwo
31
Extending AD CS attack surface to the cloud with Intune certificates
31
What’s Your Secret?: Secret Scanning by DeepPass2
31
Introducing Proton Authenticator – secure 2FA, your way
31
UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud
31
Silk Typhoon Linked to Powerful Offensive Tools
30
The New EU Corporate Sustainability Reporting Directive (EU CSRD) Is Here. Stand out with cyber volunteering!
30
Root Evidence Bets on New Concept for Vulnerability Patch Management
30
ControlMonkey Unifies Cloud and Security Teams with IaC Risk Index
30
How the Browser Became the Main Cyber Battleground
30
Gunra Ransomware Group Unveils Efficient Linux Variant
30
Policy and Disclosure: 2025 Edition
29
BadSuccessor
28
Revisiting UNC3886 Tactics to Defend Against Present Risk
28
Why Microsoft’s New Sentinel Data Lake Actually Matters
26
HTB: Cypher
26
SharePoint ToolShell – One Request PreAuth RCE Chain
26
AI-Generated Linux Miner 'Koske' Beats Human Malware
25
Escaping the Confines of Port 445
25
Translating Cyber-Risk for the Boardroom
24
Introducing Lumo, the AI where every conversation is confidential
24
Fact Sheet: President Donald J. Trump Prevents Woke AI in the Federal Government
24
Automating Azure App Services Token Decryption
23
US nuclear weapons agency hacked in Microsoft SharePoint attacks
23
Introducing OSS Rebuild: Open Source, Rebuilt to Last
23
Detecting ADCS Privilege Escalation
23
China Introduces National Cyber ID Amid Privacy Concerns
22
How to Advance from SOC Manager to CISO?
21
Why it’s time for the US to go on offense in cyberspace
21
Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
20
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Company Servers
19
HTB: Scepter
18
Nearly 2,000 MCP Servers Possess No Security Whatsoever
17
Printer Security Gaps: A Broad, Leafy Avenue to Compromise
17
HTB: Redelegate
17
Hiding Payloads in Linux Extended File Attributes
17
Chinese hackers breached National Guard to steal network configurations
17
Lessons Learned From McDonald's Big AI Flub
15
Keylogger Data Stored in an ADS
15
MITRE Introduces AADAPT Cybersecurity Framework for Cryptocurrency
15
Weaponizing Windows Drivers: A Hacker's Guide for Beginners
15
I Attempted to Build an Agentic AI ... And It Immediately Got Stuck in a Loop.
15
Hive0145 back in German inboxes with Strela Stealer and a backdoor
15
DOGE Denizen Marko Elez Leaked API Key for xAI
14
LudusHound: Raising BloodHound Attack Paths to Life
14
Improving IT efficiency with Microsoft Security Copilot in Microsoft Intune and Microsoft Entra
14
Commission presents guidelines and age verification app prototype for a safer online space for children
14
The Cyber Resilience Act: What Belgian Businesses Need to Know
13
Microsoft’s 19-hour Outlook outage exposes fragility in cloud infrastructure
12
'123456' password exposed chats for 64 million McDonald’s job applicants
11
Cybersecurity Snapshot: AI Security Field Gets Boost from New CSA Framework and from SANS - OWASP Partnership
11
Understanding the CISO: Role, skills, and security impact
10
North American APT Uses Exchange Zero-Day to Attack China
10
Microsoft confirms Windows Server Update Services (WSUS) sync is broken
10
Nonprofit Contributions to Cybersecurity: Stories, Gaps, and Opportunities for Policy and Collaboration
09
Microsoft expands Zero Trust workshop to cover network, SecOps, and more
09
Suricata 8.0.0 released
09
Know Your Enemy: Understanding Dark Market Dynamics
09
Enhancing Microsoft 365 security by eliminating high-privilege access
08
CVE-2025-1729 - Privilege Escalation Using TPQMAssistant.exe
08
Microsoft July 2025 Patch Tuesday fixes one zero-day, 137 flaws
08
Android malware Anatsa infiltrates Google Play to target US banks
08
Detection Engineering: Practicing Detection-as-Code – Introduction – Part 1
08
How a Low-Level IT Worker Helped Hack Brazil’s Banking System — Step by Step
07
Learn how to build an AI-powered, unified SOC in new Microsoft e-book
07
Commission launches strategy to make Europe Quantum leader by 2030
05
ScriptCase - Pre-Authenticated Remote Command Execution
04
Ubuntu Disables Spectre/Meltdown Protections
04
Identifying and abusing Azure Arc for hybrid escalation and persistence
02
We've All Been Wrong: Phishing Training Doesn't Work
02
Houken seeking a path by living on the edge with zero-days
01
Protecting the Core: Securing Protection Relays in Modern Substations

June 2025

30
Hide Your RDP: Password Spray Leads to RansomHub Deployment
30
NIS2 Technical Implementation Guidance
27
Unveiling RIFT: Enhancing Rust malware analysis through pattern matching
27
US Falling Behind China in Exploit Production
27
The Journey of Bypassing Ubuntu’s Unprivileged Namespace Restriction
27
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options
27
How Today’s Pentest Models Compare and Why Continuous Wins
27
The road to Top 1: How XBOW did it
21
Are Forgotten AD Service Accounts Leaving You at Risk?
21
HTB: Shibuya
21
Understanding and Mitigating Golden SAML Attacks
21
HTB: Down
21
[BE/FR] Le futur quartier militaire de Charleroi, symbole des défis immobiliers de l’armée belge
21
Fact Sheet: President Donald J. Trump Reprioritizes Cybersecurity Efforts to Protect America
16
NIST Offers 19 Ways to Build Zero Trust Architectures
14
HTB: Infiltrator
13
Cyberattacks on Humanitarian Orgs Jump Worldwide
13
Why CISOs Must Align Business Objectives & Cybersecurity
12
Foundations of Cybersecurity: Reassessing What Matters
12
SmartAttack uses smartwatches to steal data from air-gapped systems
12
CVE-2025-26685 – Spoofing to Elevate Privileges with Microsoft Defender for Identity
11
Breaking down ‘EchoLeak’, the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot
11
NTLM REFLECTION IS DEAD, LONG LIVE NTLM REFLECTION! – AN IN-DEPTH ANALYSIS OF CVE-2025-33073
11
Introducing secure password deployment in Microsoft Edge for Business
10
Microsoft Outlook to block more risky attachments used in attacks
10
Microsoft’s June 2025 Patch Tuesday
09
Update: Dumping Entra Connect Sync Credentials
07
HTB: Backfire
05
Introducing Wazuh CTI
04
35K Solar Devices Vulnerable to Potential Hijacking
04
RemoteMonologue: Weaponizing DCOM for NTLM authentication coercions
03
Is Your CISO Navigating Your Flight Path?

May 2025

28
Microsoft wants Windows to update all software on your PC
19
The Windows Subsystem for Linux is now open source
16
Announcing the Official Parity Release of Volatility 3!
13
Consult the European Vulnerability Database to enhance your digital security!
09
LockBit Ransomware Gang Breached, Secrets Exposed
Some news and recent articles about cybersecurity that I find interesting. Entirely subjective and obviously not error-free. Belgian bias. Sometimes, each word stands out; other times, it’s the overall idea that matters most. No comment, just the link. Dates indicate when the link was added, not the article’s original date.
contact : [email protected]