GPT-5
19
Jul
2025

ChatGPT”s GPT-5-reasoning-alpha model spotted ahead of launch

GPT-5 might be just a few days or weeks away, as we’ve spotted references to a new model called gpt-5-reasoning-alpha-2025-07-13….

Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials
19
Jul
2025

Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials

A sophisticated phishing campaign targeting Turkish defense and aerospace enterprises has emerged, delivering a highly evasive variant of the Snake…

19
Jul
2025

The Difference Between a Vulnerability Assessment and a Penetration Test

Language Matters > Clarified Definitions > A Physical Analog > The Exploitation Angle > Pentests Don’t Include VA > Summary…

Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware
19
Jul
2025

Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware

A sophisticated Chinese threat actor campaign has emerged as one of the most persistent malware distribution operations targeting Chinese-speaking communities…

19
Jul
2025

The Difference Between a Vulnerability Assessment and a Penetration Test

Language Matters > Clarified Definitions > A Physical Analog > The Exploitation Angle > Pentests Don’t Include VA > Summary…

New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users
19
Jul
2025

New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users

A sophisticated phishing campaign targeting organizations has emerged, exploiting the trusted reputation of Veeam Software through weaponized WAV audio files…

China’s Salt Typhoon Hackers Breached the US National Guard for Nearly a Year
19
Jul
2025

China’s Salt Typhoon Hackers Breached the US National Guard for Nearly a Year

After reporting last week that the “raw” Jeffrey Epstein prison video posted by the FBI was likely modified in at…

19
Jul
2025

An IPTABLES Primer

iptables is the packet filtering technology that’s built into the 2.4 Linux kernel. It’s what allows one to do firewalling,…

New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers
19
Jul
2025

New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers

A critical zero-day flaw in the CrushFTP managed file-transfer platform was confirmed after vendor and threat-intelligence sources confirmed active exploitation…

19
Jul
2025

Why You Should Dump Internet Explorer

The time has come to dump Internet Explorer. I know, I know — you may have heard the same thing…

New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials
19
Jul
2025

New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

A sophisticated phishing campaign dubbed “Scanception” has emerged as a significant threat to enterprise security, leveraging QR codes embedded in…

19
Jul
2025

Diffie-Hellman

Diffie-Hellman is a key exchange protocol developed by Diffie and Hellman (imagine that) in 1976. The purpose of Diffie-Hellman is…