• Home
  • Blog
  • Videos
  • Contact
  • Services

Blog


  • Microsoft’s New Security Store Brings Agentic AI to the SOC—Promise, Pitfalls, and Procurement

    Oct 2, 2025

    —

    by

    RedSecNinja
    in Cybersecurity, News

  • Supply-Chain Risk in AI Agent Tooling: Malicious MCP Server on npm

    Oct 1, 2025

    —

    by

    RedSecNinja
    in Uncategorized

  • Akira Ransomware Is Rocketing Through SonicWall SSL VPNs (Even with MFA)

    Oct 1, 2025

    —

    by

    RedSecNinja
    in Uncategorized

  • CISA ED 25-03: Cisco ASA Exploited—What Orgs Must Do Now

    Sep 29, 2025

    —

    by

    RedSecNinja

  • HybridPetya: UEFI Bootkit + Ransomware, Explained

    Sep 29, 2025

    —

    by

    RedSecNinja
    in Cybersecurity

  • Webshells in Well-Known Paths: A Stealthy Persistence Vector

    Sep 26, 2025

    —

    by

    RedSecNinja
    in Cybersecurity

  • Microsoft Entra ID Flaw Chain Enabled Cross-Tenant God Mode

    Sep 22, 2025

    —

    by

    RedSecNinja
    in Cybersecurity, News

  • Subtle Snail Hits Telcos & Satellite Operators with Job-Lure Phishing

    Sep 22, 2025

    —

    by

    RedSecNinja
    in Cybersecurity, News

  • Turla x Gamaredon: First Documented Collaboration Targets High-Value Machines in Ukraine

    Sep 22, 2025

    —

    by

    RedSecNinja
    in Uncategorized

  • Secure Boot Under Siege: How Signed Drivers Enable BYOVD Attacks

    Sep 11, 2025

    —

    by

    RedSecNinja
    in Cybersecurity, News
←Previous Page
1 2 3 4 … 6
Next Page→

Think like a hacker, secure like a ninja

  • Subscribe Subscribed
    • redsec.ninja
    • Already have a WordPress.com account? Log in now.
    • redsec.ninja
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar