Listen

Description

From Perfctl to InfoStealer

https://isc.sans.edu/diary/From%20Perfctl%20to%20InfoStealer/31334

Wazuh Abused by Miner Campaign

https://securelist.com/miner-campaign-misuses-open-source-siem-agent/114022/

USB Sticks Still Bridge Airgaps

https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/

Fortigate Vulnerability now being exploited

https://nvd.nist.gov/vuln/detail/CVE-2024-23113