Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Category: blue-team

The December 2025 Ubisoft Incident: Rainbow Six Siege Backend Compromise and Exaggerated Breach Claims
blue-team

The December 2025 Ubisoft Incident: Rainbow Six Siege Backend Compromise and Exaggerated Breach Claims

Ubisoft data breach 2025 In the world of enterprise information security, few incidents highlight the perils of backend misconfigurations and

by ☣️ Mr. The Plague ☣️
Read More
HackMap: A Powerful Local Penetration Testing Mapping Tool for Advanced Graph Note Keeping
blue-team

HackMap: A Powerful Local Penetration Testing Mapping Tool for Advanced Graph Note Keeping

In the world of ethical hacking and penetration testing, visualizing attack paths and managing command history can make all the

by ☣️ Mr. The Plague ☣️
Read More
Discover CyberDeck: The Ultimate Hacker’s Cookbook for Penetration Testing
pentesting

Discover CyberDeck: The Ultimate Hacker’s Cookbook for Penetration Testing

In the high-stakes world of simulating advanced persistent threats (APTs), exploiting vulnerabilities, and hunting for weaknesses in complex systems, efficiency

by ☣️ Mr. The Plague ☣️
Read More
CVE-2025-53770 Microsoft Releases Urgent Patch for Critical SharePoint Vulnerability Under Active Exploitation
Exploits

CVE-2025-53770 Microsoft Releases Urgent Patch for Critical SharePoint Vulnerability Under Active Exploitation

Microsoft has released out-of-band security updates to address a critical remote code execution vulnerability in on-premises SharePoint Server that is

by ☣️ Mr. The Plague ☣️
Read More
New Episode of SquidSec Podcast is Live! –
Cyber Security

New Episode of SquidSec Podcast is Live! –

by ☣️ Mr. The Plague ☣️
Read More
Abusing Software Supply Chain Vulnerabilities: A Comprehensive Analysis of Attacks, Techniques, and Defenses
blue-team

Abusing Software Supply Chain Vulnerabilities: A Comprehensive Analysis of Attacks, Techniques, and Defenses

Introduction Software supply chain attacks have become a cornerstone of modern cyber threats, exploiting the intricate web of dependencies, tools,

by ☣️ Mr. The Plague ☣️
Read More
Cybersecurity Under Siege: Major Incidents and Actionable Strategies for 2025
red-team

Cybersecurity Under Siege: Major Incidents and Actionable Strategies for 2025

The cybersecurity landscape is evolving at breakneck speed, and the past 72 hours (May 25–27, 2025) have unleashed a torrent

by ☣️ Mr. The Plague ☣️
Read More
Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview
pentesting

Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview

Cybersecurity threats continued to evolve in May 2025, with high-profile incidents, critical vulnerabilities, and emerging trends reshaping the landscape. From

by ☣️ Mr. The Plague ☣️
Read More
ScreenSniper: A Powerful Tool for PenTesting and Webpage Analysis
Cyber Security

ScreenSniper: A Powerful Tool for PenTesting and Webpage Analysis

In the fast-evolving world of cybersecurity, penetration testers need efficient tools to identify vulnerabilities quickly and accurately. Enter ScreenSniper, a

by ☣️ Mr. The Plague ☣️
Read More
Coinbase Catastrophe: Uncle Pennybags Loses Big in Bitcoin Hack!
Cyber Security

Coinbase Catastrophe: Uncle Pennybags Loses Big in Bitcoin Hack!

Key Points and Direct Answer Incident Overview On May 15, 2025, Coinbase disclosed a cyberattack where hackers bribed overseas support

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

1 2 3 Next
© SQUID SEC 2026 - Website developed by WP Theme Space | Create Your Professional Website