CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24989 Microsoft Power Pages Improper Access Control Vulnerability These types of vulnerabilities are frequent...
A 2025. 8. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2025.02.14. és 2025.02.20. között kezelt incidensek statisztikai adatait is tartalmazza.
Tool update: sigs.py - added check mode, (Fri, Feb 21st)
Over the years, I've written a number of scripts to make my life easier. One of those tools was sigs.py (which was a rewrite of an old perl script sigs.pl) to hash files. I wanted something portable that could potentially be a drop-in...
Zero Trust World: Endpoint risks for Linux environments
ThreatLocker's Daniel Madden looks at understanding the risks present in a Linux environment, discovering the ways we can take action to harden against these risks, and some pitfalls to be avoided when taking action.
The China-backed threat group often acts swiftly, going from initial access to compromise in just one day, a behavior atypical of cybercriminal groups.