So many times, we look beyond the mark. With our feeds constantly inundated with headline-grabbing news about AI-generated threats, nation states upping their cybercrime game, and sophisticated new forms of malware, we can be tempted to think that the bulk of cyberwarfare is going on “up there” somewhere. In reality, most breaches still originate from unforced errors, and threat actors are just like anybody else – they don’t like working harder than they need to. That’s why the golden rule of cybercrime seems to be “try the easy stuff first.” And some of the easiest things are doors that…
No tags for this post.
Configurations Mega Blog: Why Configurations Are the Wrong Thing to Get Wrong
Recent Posts
- CVE-2025-21630 – Linux Kernel: io_uring: Uninitialized Message Queue Inquire
- CVE-2025-21629 – “Linux Net IF – IPv6 extension header offload vulnerability”
- CVE-2024-5198 – OpenVPN for Windows DLL Injection Null Pointer Dereference
- CVE-2024-57903 – Linux kernel SO_REUSEPORT Inet Socket Restriction Comic Book Bug
- CVE-2024-57902 – Linux Kernel af_packet: VLAN Get TCI Vulnerability