23
Jul
2025

Cervantes: Open-source, collaborative platform for pentesters and red teams

Cervantes is an open-source collaborative platform built for pentesters and red teams. It offers a centralized workspace to manage projects,…

23
Jul
2025

Free Will and Punishment

It seems to me that the decision, both as an individual and as a society, to either punish or rehabilitate…

CISA Alerts on Active Exploitation of Microsoft SharePoint Code Injection and Authentication Vulnerabilities
23
Jul
2025

CISA Alerts on Active Exploitation of Microsoft SharePoint Code Injection and Authentication Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued urgent alerts regarding the active exploitation of two critical Microsoft SharePoint…

23
Jul
2025

Phishing simulations: What works and what doesn’t

Phishing is one of the oldest and most effective scams used by cybercriminals. No one is immune to them, not…

CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks
23
Jul
2025

CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

Jul 23, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on July 22, 2025, added…

23
Jul
2025

Free Will and Punishment

It seems to me that the decision, both as an individual and as a society, to either punish or rehabilitate…

23
Jul
2025

The fraud trends shaping 2025: Pressure builds on online retailers

Fraud is growing faster than revenue in eCommerce. That’s one of the first things PwC and Forter point out in…

23
Jul
2025

A Fantasy Explanation of Standard vs. Blind SQL Injection

Many in InfoSec get confused about the difference between standard and blind SQL injection. Here’s a simple way to think…

23
Jul
2025

A Fantasy Explanation of Standard vs. Blind SQL Injection

Many in InfoSec get confused about the difference between standard and blind SQL injection. Here’s a simple way to think…

23
Jul
2025

Harry Potter and the Extension of Reality

This will be a strange post. I just finished the Harry Potter series, and I’m a bit overwhelmed. I’m quite…

Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code
23
Jul
2025

Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code

Google has released an urgent security update for its Chrome browser, addressing three critical vulnerabilities that could enable attackers to…

23
Jul
2025

Harry Potter and the Extension of Reality

This will be a strange post. I just finished the Harry Potter series, and I’m a bit overwhelmed. I’m quite…