BI.ZONEBreaking down CVE-2024–38063: remote exploitation of the Windows kernelWe have examined the Windows TCP/IP network stack flaw that could grant adversaries remote access with maximum privileges. Exploiting…Sep 3
Dmytro SazonovinDataDrivenInvestorDIY for a Spy: Cybersecurity Techniques for the Secret AgentFollow these simple steps to shield your privacy with a few essential tricks from the White Hats and experts in Information Security.Jul 209
CyberSync HubThe Application Delivery Controller (ADC) Imperative: Exploring Mechanics and Business Value.With businesses increasingly relying on web-based applications to drive their operations, ensuring optimal performance, security, and…17h ago17h ago
Into Cyber -- Joseph Howard, PhDA Brazen Claim from a Cyber Newbie: Hands-On Skills aren’t EnoughA little over a year ago I began considering the possibility of a career pivot into cybersecurity. It would be a major change for me and…Aug 811Aug 811
BI.ZONEBreaking down CVE-2024–38063: remote exploitation of the Windows kernelWe have examined the Windows TCP/IP network stack flaw that could grant adversaries remote access with maximum privileges. Exploiting…Sep 3
Dmytro SazonovinDataDrivenInvestorDIY for a Spy: Cybersecurity Techniques for the Secret AgentFollow these simple steps to shield your privacy with a few essential tricks from the White Hats and experts in Information Security.Jul 209
CyberSync HubThe Application Delivery Controller (ADC) Imperative: Exploring Mechanics and Business Value.With businesses increasingly relying on web-based applications to drive their operations, ensuring optimal performance, security, and…17h ago
Into Cyber -- Joseph Howard, PhDA Brazen Claim from a Cyber Newbie: Hands-On Skills aren’t EnoughA little over a year ago I began considering the possibility of a career pivot into cybersecurity. It would be a major change for me and…Aug 811
Christopher RyanLet’s Defend SOC250 — APT35 HyperScrape Data Exfiltration Tool Detected Write UpThis is my write up of responding alert in Let’s Defend Lab. I use the Let’s Defend Lab platform to enhance my cybersecurity skills. If…13h ago
Luke PaineinPosts By SpecterOps Team MembersTo Infinity and Beyond!Increasing our understanding of EDR capabilities in the face of impossible odds.May 301
Mikko KenttäläZero-Click Calendar invite — Critical zero-click vulnerability chain in macOSCritical zero-click vulnerability chain in macOS (patched)Sep 12