Building a Basic Cyber Threat Intelligence Program for Any Size Business
Protect Your Business with Essential Cyber Threat Intelligence
Evil Genius: Turning EDR into Malware - A Deep Dive into Shmuel Cohen's Cortex XDR Exploit
This blog post explores a groundbreaking discovery by Shmuel Cohen at SafeBreach Labs, where Palo Alto Networks' Cortex XDR, a leading EDR platform, was turned into a tool for attackers. Dive into the technical details of the exploit and its implications for cybersecurity.
Unraveling the XZ Backdoor: A Close Call for Open Source Security
An in-depth analysis of the recent XZ Backdoor incident, highlighting the resilience of the open source community in the face of a sophisticated supply chain attack. This post unpacks the details of the CVE-2024-3094 event, where a well-executed backdoor nearly compromised major Linux distributions, and the collaborative effort that led to its discovery and mitigation.
Pi-hole: Your Ultimate Solution for a Cleaner, Faster Internet Experience
Unlock the full potential of your home network with Pi-hole, the open-source software that blocks ads, trackers, and malware domains on all your devices. This guide walks you through the simple steps of installing Pi-hole using Docker, ensuring a secure, ad-free internet experience without the hassle.