1 day ago|discuss
user: waihtis
2269 karma | created 11 years ago
recent submissions
1 day ago|discuss
10 days ago|discuss
20 days ago|discuss
20 days ago|discuss
Sleeper Shells: Attackers Are Planting Dormant Backdoors in Ivanti EPMM
(defusedcyber.com)
149 pts|20 days ago|52 comments
29 days ago|discuss
2 months ago|discuss
2 months ago|discuss
React2Shell Exploitation: A Short Summary of Honeypot Activity
(defusedcyber.com)
3 pts|2 months ago|discuss
5 months ago|discuss
6 months ago|discuss
6 months ago|discuss
6 months ago|discuss
6 months ago|discuss
6 months ago|discuss
SharePoint Exploit Intelligence with Honeypots
(defusedcyber.com)
2 pts|7 months ago|discuss
Tracking Ransomware-Exploited Vulnerabilities by Likelihood of Exploitation
(ransomvulns.defusedcyber.com)
1 pts|9 months ago|discuss
Lockbit SQL Dump Visualizer
(sqldump.defusedcyber.com)
2 pts|9 months ago|discuss
11 months ago|discuss