Monitoring Changes in KEV List Can Guide Security Teams Posted on August 7, 2024 The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.
Ivanti VPN Flaw Exploited to Inject Novel Backdoor; Hundreds Pwned News A SAML vulnerability in Ivanti appliances has led to persistent… rooter February 16, 2024 1 min read 0
CISA Warns on Unpatched ICS Vulnerabilities Lurking in Critical Infrastructure News The advisory comes the same week as a warning from… rooter March 22, 2023 1 min read 0
Deborah Chow Chats About the Work Behind Obi-Wan Kenobi News Deborah Chow, the director of the Disney+ show, Obi-Wan Kenobi,… rooter May 29, 2023 1 min read 0
Neo_Net runs eCrime campaign targeting clients of banks globally News A Mexican threat actor that goes online with the moniker… rooter July 4, 2023 3 min read 0