NoorHomaidTesting SolarWinds Serv-U Path Directory Transversal Vulnerability (CVE-2024–28995)Exploiting a Directory Transversal Vulnerability in SolarWinds Serv-U FTP serverJun 25
Ryan McGeehaninStarting Up SecurityLessons from the SEC’s Lawsuit against SolarWinds and Tim BrownA few days ago, the SEC filed a lawsuit against SolarWinds and their CISO that shares some similarities with the blameless post-mortem of…Nov 6, 2023
Thiago Marsal FariasSolarWinds the most significant Cybert Attack in HistoryThe year was 2020, and the target was the U.S. Where the most proficient cyber attack allowed criminals access to massive amounts of…Sep 17, 20221Sep 17, 20221
PamC/FLYINGMUMDIGITAL UNDER SIEGE : THE SUNBURT HACK THAT SHOCKED THE WORLDMalicious code attack in December 2020Feb 3Feb 3
eKRAAL Innovation HubSolarWinds Breach in a nutshellThe breach has reminded both novice and experienced the value of establishing safe and effective personal online security habitsJan 8, 2021Jan 8, 2021
NoorHomaidTesting SolarWinds Serv-U Path Directory Transversal Vulnerability (CVE-2024–28995)Exploiting a Directory Transversal Vulnerability in SolarWinds Serv-U FTP serverJun 25
Ryan McGeehaninStarting Up SecurityLessons from the SEC’s Lawsuit against SolarWinds and Tim BrownA few days ago, the SEC filed a lawsuit against SolarWinds and their CISO that shares some similarities with the blameless post-mortem of…Nov 6, 2023
Thiago Marsal FariasSolarWinds the most significant Cybert Attack in HistoryThe year was 2020, and the target was the U.S. Where the most proficient cyber attack allowed criminals access to massive amounts of…Sep 17, 20221
PamC/FLYINGMUMDIGITAL UNDER SIEGE : THE SUNBURT HACK THAT SHOCKED THE WORLDMalicious code attack in December 2020Feb 3
eKRAAL Innovation HubSolarWinds Breach in a nutshellThe breach has reminded both novice and experienced the value of establishing safe and effective personal online security habitsJan 8, 2021
Gregory Scott HensonSolarWinds Hack is Iur “Cyber Pandemic”SolarWinds cyberattack came from overseas, arriving unnoticed initially…May 6, 2023
Ankush KHow to Secure Software Supply Chain?Let us split the elephant into three pieces: * What exactly is a Software Supply Chain? * What is Supply Chain Attack? * How do we secure…May 1, 20231
Taylor ArmerdingHe helped write the book on how to improve critical infrastructure cybersecurityThere is nob debate that the cybersecurity of U.S. critical infrastructure needs improving. So here’s another book that tells how to do it.Feb 27, 2023