62
3
React2Shell Exploitation: A Short Summary of Honeypot Activity (defusedcyber.com)
1
SharePoint Exploit Intelligence with Honeypots (defusedcyber.com)
1
Tracking Ransomware-Exploited Vulnerabilities by Likelihood of Exploitation (defusedcyber.com)
1
Lockbit SQL Dump Visualizer (defusedcyber.com)
1
Satoshi Nakamoto Is Not an Individual (the-void.blog)
2
Deception Plays a Large Role in NIST SP 800-160 (defusedcyber.com)
3
Cyber Deception Has Use Cases You Aren't Thinking Of (defusedcyber.com)
1
A Crypto Turfwar with Cloud Decoys (defusedcyber.com)
1
Mastercard acquires cyber threat intelligence company Recorded Future (mastercard.com)
13
Defcon Response to Badge Issues (twitter.com/defcon)
1
Cyber Deception vs. Honeypots (defusedcyber.com)
1
Misconceptions of AI-Driven Attacks in Infosec (defusedcyber.com)
1
Microsoft GPT Builder is being retired (microsoft.com)
76
Pleasures by Aldous Huxley (1920) (hackneybooks.co.uk)
1
Conference Fabricates Female Speaker Profiles to Inflate Diversity Appearance (twitter.com/gergelyorosz)
2
Lockbit Ransomware Group Claims to Have Ransomed Boeing via Zero-Day (twitter.com/vxunderground)
2
Over 34k Hosts Currently Infected Due to Cisco iOS XE Vulnerability (twitter.com/certcyberdef)
53
Quake related work logs (1996) (gamers.org)
27
‘X’ logo installed atop Twitter building, SF to investigate permit violation (apnews.com)
3