Skip to content
SQUID SEC
Menu
  • Home
  • Cheat Sheets
  • Hire SquidSec
  • SquidSec Team
  • Squid Sec Twitter
  • SquidSec Podcast
  • Home
  • Cheat Sheets
  • Hire SquidSec
  • SquidSec Team
  • Squid Sec Twitter
  • SquidSec Podcast

Category: blue-team

Cyber Geopolitics: Nation-State Actors, Trade Wars, and Sanctions Weaponizing the Digital Economy – Resilience Tactics That Actually Work
weekly-brief

Cyber Geopolitics: Nation-State Actors, Trade Wars, and Sanctions Weaponizing the Digital Economy – Resilience Tactics That Actually Work

Part 3 of “Building Resilience in a Globalized Digital Economy.” After NPM worms and full-spectrum supply-chain armageddon, here’s the ugly

by ☣️ Mr. The Plague ☣️
Read More
Supply Chain Armageddon Now: Defending Software, Hardware, and MSP Dependencies in a World Without Borders
News

Supply Chain Armageddon Now: Defending Software, Hardware, and MSP Dependencies in a World Without Borders

From Shai-Hulud worms cascading across npm to UEFI bootkit persistence and MSP credential abuse turning one breach into hundreds—2025–2026 proved

by ☣️ Mr. The Plague ☣️
Read More
NPM Attacks in 2026: Escalating Supply Chain Threats in the Globalized JavaScript Ecosystem – And Why Your SBOM Still Won’t Save You
weekly-brief

NPM Attacks in 2026: Escalating Supply Chain Threats in the Globalized JavaScript Ecosystem – And Why Your SBOM Still Won’t Save You

If you read my last deep-dive on NPM supply-chain risks, you remember the punchline: the JavaScript ecosystem is a house

by ☣️ Mr. The Plague ☣️
Read More
The December 2025 Ubisoft Incident: Rainbow Six Siege Backend Compromise and Exaggerated Breach Claims
Cyber Security

The December 2025 Ubisoft Incident: Rainbow Six Siege Backend Compromise and Exaggerated Breach Claims

Ubisoft data breach 2025 In the world of enterprise information security, few incidents highlight the perils of backend misconfigurations and

by ☣️ Mr. The Plague ☣️
Read More
HackMap: A Powerful Local Penetration Testing Mapping Tool for Advanced Graph Note Keeping
Cyber Security

HackMap: A Powerful Local Penetration Testing Mapping Tool for Advanced Graph Note Keeping

In the world of ethical hacking and penetration testing, visualizing attack paths and managing command history can make all the

by ☣️ Mr. The Plague ☣️
Read More
CyberDeck: The Ultimate Retro Sci-Fi Hacker’s Cookbook for Red Teamers & Pentesters
pentesting

CyberDeck: The Ultimate Retro Sci-Fi Hacker’s Cookbook for Red Teamers & Pentesters

In the ever-evolving landscape of offensive security—where cloud misconfigs, Active Directory attacks, and living-off-the-land binaries dominate engagements—speed and muscle memory

by ☣️ Mr. The Plague ☣️
Read More
CVE-2025-53770 Microsoft Releases Urgent Patch for Critical SharePoint Vulnerability Under Active Exploitation
red-team

CVE-2025-53770 Microsoft Releases Urgent Patch for Critical SharePoint Vulnerability Under Active Exploitation

Microsoft has released out-of-band security updates to address a critical remote code execution vulnerability in on-premises SharePoint Server that is

by ☣️ Mr. The Plague ☣️
Read More
New Episode of SquidSec Podcast is Live! –
Exploits

New Episode of SquidSec Podcast is Live! –

by ☣️ Mr. The Plague ☣️
Read More
Abusing Software Supply Chain Vulnerabilities: A Comprehensive Analysis of Attacks, Techniques, and Defenses
Educational

Abusing Software Supply Chain Vulnerabilities: A Comprehensive Analysis of Attacks, Techniques, and Defenses

Introduction Software supply chain attacks have become a cornerstone of modern cyber threats, exploiting the intricate web of dependencies, tools,

by ☣️ Mr. The Plague ☣️
Read More
Cybersecurity Under Siege: Major Incidents and Actionable Strategies for 2025
News

Cybersecurity Under Siege: Major Incidents and Actionable Strategies for 2025

The cybersecurity landscape is evolving at breakneck speed, and the past 72 hours (May 25–27, 2025) have unleashed a torrent

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

1 2 3 Next
SQUID SECURITY LLC 2026