03/10

Magnet Goblin hackers use 1-day flaws to drop custom Linux malware

https://www.bleepingcomputer.com/news/security/magnet-goblin-hackers-use-1-day-flaws-to-drop-custom-linux-malware/
Magnet Goblin hackers use 1-day flaws to drop custom Linux malware

SOC Analyst Training: How to Analyze Malicious PDFs - YouTube

https://www.youtube.com/watch?v=AzXf7GV0jew
SOC Analyst Training: How to Analyze Malicious PDFs - YouTube

the Apple curl security incident 12604 | daniel.haxx.se

https://daniel.haxx.se/blog/2024/03/08/the-apple-curl-security-incident-12604/
the Apple curl security incident 12604 | daniel.haxx.se

Hackers exploit WordPress plugin flaw to infect 3,300 sites with malware

https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-flaw-to-infect-3-300-sites-with-malware/
Hackers exploit WordPress plugin flaw to infect 3,300 sites with malware

Game of Active Directory (GOAD) | Ludus

https://docs.ludus.cloud/docs/Environment%20Guides/goad/
Game of Active Directory (GOAD) | Ludus

TrustedSec | Careers

https://www.trustedsec.com/about-us/careers
TrustedSec | Careers

Malware Reverse Engineering for Beginners - Part 1: From 0x0 - Intezer

https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/
Malware Reverse Engineering for Beginners - Part 1: From 0x0 - Intezer

sicat: an advanced exploit search tool

https://securityonline.info/sicat-an-advanced-exploit-search-tool/
sicat: an advanced exploit search tool