The threat actor uses custom Linux malware to pursue financial gain, according to Check Point Research
Magnet Goblin Exploits Ivanti Vulnerabilities
March 11, 2024 0 Comments
Explore More
Friday Squid Blogging: Vegan Squid-Ink Pasta
February 16, 2024 0 Comments
It uses black beans for color and seaweed for flavor. As usual, you can also use this squid post to talk about the security stories in the news that I
Predator spyware endures even after widespread exposure, analysis shows
March 1, 2024 0 Comments
When researchers and journalists published a sweeping investigation last year detailing the technical infrastructure and sale and distribution of the spyware known as “Predator,” the number of servers used to
White House Urges Tech Industry to Eliminate Memory Safety Vulnerabilities
February 26, 2024 0 Comments
A new White House report has urged software and hardware developers to adopt memory safe programming languages, and eliminate one of the most pervasive classes of bugs