19
Jul
2025

The Difference Between a Vulnerability Assessment and a Penetration Test

Language Matters > Clarified Definitions > A Physical Analog > The Exploitation Angle > Pentests Don’t Include VA > Summary…

Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware
19
Jul
2025

Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware

A sophisticated Chinese threat actor campaign has emerged as one of the most persistent malware distribution operations targeting Chinese-speaking communities…

19
Jul
2025

The Difference Between a Vulnerability Assessment and a Penetration Test

Language Matters > Clarified Definitions > A Physical Analog > The Exploitation Angle > Pentests Don’t Include VA > Summary…

New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users
19
Jul
2025

New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users

A sophisticated phishing campaign targeting organizations has emerged, exploiting the trusted reputation of Veeam Software through weaponized WAV audio files…

China’s Salt Typhoon Hackers Breached the US National Guard for Nearly a Year
19
Jul
2025

China’s Salt Typhoon Hackers Breached the US National Guard for Nearly a Year

After reporting last week that the “raw” Jeffrey Epstein prison video posted by the FBI was likely modified in at…

19
Jul
2025

An IPTABLES Primer

iptables is the packet filtering technology that’s built into the 2.4 Linux kernel. It’s what allows one to do firewalling,…

New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers
19
Jul
2025

New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers

A critical zero-day flaw in the CrushFTP managed file-transfer platform was confirmed after vendor and threat-intelligence sources confirmed active exploitation…

19
Jul
2025

Why You Should Dump Internet Explorer

The time has come to dump Internet Explorer. I know, I know — you may have heard the same thing…

New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials
19
Jul
2025

New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

A sophisticated phishing campaign dubbed “Scanception” has emerged as a significant threat to enterprise security, leveraging QR codes embedded in…

19
Jul
2025

Diffie-Hellman

Diffie-Hellman is a key exchange protocol developed by Diffie and Hellman (imagine that) in 1976. The purpose of Diffie-Hellman is…

19
Jul
2025

An IPTABLES Primer

iptables is the packet filtering technology that’s built into the 2.4 Linux kernel. It’s what allows one to do firewalling,…

19
Jul
2025

Geek Battles: A Call for Perspective

“Linux sucks as a desktop.” “Windows is insecure.” “OS X is for rich, trendy art majors.” Depending on who’s in…