CVE-2024-49113 Detection: Windows LDAP Denial-of-Service Vulnerability aka LDAPNightmare Exploited via a Publicly Available PoC Threats Hot on the heels of the release of the first… rooter January 17, 2025 4 min read 0
SOC Prime Threat Bounty Digest — December 2024 Results Threats Detection Content Creation, Submission & Release December was another impressive… rooter January 17, 2025 3 min read 0
CVE-2024-55591 Detection: Critical Zero-Day Vulnerability in Fortinet FortiOS and FortiProxy Actively Exploited in the Wild Threats This week, over 700 new vulnerabilities have been identified, continuing… rooter January 16, 2025 3 min read 0
Detect Banshee Stealer: Stealthy Apple macOS Malware Evades Detection Using XProtect Encryption Threats New year, new menaces for cyber defenders. Cybersecurity researchers have… rooter January 14, 2025 4 min read 0
EAGERBEE Malware Detection: New Backdoor Variant Targets Internet Service Providers and State Bodies in the Middle East Threats Hot on the heels of the re-emergence of a more… rooter January 8, 2025 4 min read 0
Message Queues vs. Streaming Systems: Key Differences and Use Cases Threats In the world of data processing and messaging systems, terms… rooter January 6, 2025 5 min read 0
What is Event Streaming in Apache Kafka? Threats Event streaming is a powerful data processing paradigm where events—small,… rooter January 6, 2025 2 min read 0
NonEuclid RAT Detection: Malware Enables Adversaries to Gain Unauthorized Remote Access and Control Over a Targeted System Threats The modern-day cyber threat landscape is marked by the rise… rooter January 6, 2025 4 min read 0
Elasticsearch: Cluster Status is RED Threats It happens very rarely, but sometimes your cluster gets red… rooter January 3, 2025 1 min read 0
Search and Replace Text in SPL Fields with rex Threats Sometimes when working with fields in SPL, it can be… rooter January 2, 2025 1 min read 0