Home
Blog
Videos
Contact
Services
Blog
Microsoft’s New Security Store Brings Agentic AI to the SOC—Promise, Pitfalls, and Procurement
Oct 2, 2025
—
by
RedSecNinja
in
Cybersecurity
,
News
Supply-Chain Risk in AI Agent Tooling: Malicious MCP Server on npm
Oct 1, 2025
—
by
RedSecNinja
in
Uncategorized
Akira Ransomware Is Rocketing Through SonicWall SSL VPNs (Even with MFA)
Oct 1, 2025
—
by
RedSecNinja
in
Uncategorized
CISA ED 25-03: Cisco ASA Exploited—What Orgs Must Do Now
Sep 29, 2025
—
by
RedSecNinja
HybridPetya: UEFI Bootkit + Ransomware, Explained
Sep 29, 2025
—
by
RedSecNinja
in
Cybersecurity
Webshells in Well-Known Paths: A Stealthy Persistence Vector
Sep 26, 2025
—
by
RedSecNinja
in
Cybersecurity
Microsoft Entra ID Flaw Chain Enabled Cross-Tenant God Mode
Sep 22, 2025
—
by
RedSecNinja
in
Cybersecurity
,
News
Subtle Snail Hits Telcos & Satellite Operators with Job-Lure Phishing
Sep 22, 2025
—
by
RedSecNinja
in
Cybersecurity
,
News
Turla x Gamaredon: First Documented Collaboration Targets High-Value Machines in Ukraine
Sep 22, 2025
—
by
RedSecNinja
in
Uncategorized
Secure Boot Under Siege: How Signed Drivers Enable BYOVD Attacks
Sep 11, 2025
—
by
RedSecNinja
in
Cybersecurity
,
News
←
Previous Page
1
2
3
4
…
6
Next Page
→
Subscribe
Subscribed
redsec.ninja
Sign me up
Already have a WordPress.com account?
Log in now.
redsec.ninja
Subscribe
Subscribed
Sign up
Log in
Report this content
View site in Reader
Manage subscriptions
Collapse this bar