Featured Detecting CVE-2025-20393 exploitation: catching UAT-9686 on Cisco appliances Ground your defense against React2Shell in verifiable network evidence. Deploy high-fidelity Suricata detections to spot unauthenticated remote code... David Burkett Dec 19, 2025
Zeek Detect C2 ‘RedXOR’ with state-based functionality A very interesting Linux-based command-and-control (C2) malware was described by the research team at Intezer. Here are a few points about this... Ben Reardon Apr 20, 2021