SUPPLY CHAIN |
2023-07-18 | Johannes Ullrich | Exploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256 |
2019-10-24 | Johannes Ullrich | Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment? |
SUPPLY |
2023-07-18/a> | Johannes Ullrich | Exploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256 |
2019-10-24/a> | Johannes Ullrich | Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment? |
CHAIN |
2024-07-16/a> | Jan Kopriva | "Reply-chain phishing" with a twist |
2023-07-18/a> | Johannes Ullrich | Exploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256 |
2022-09-19/a> | Russ McRee | Chainsaw: Hunt, search, and extract event log records |
2019-10-24/a> | Johannes Ullrich | Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment? |
2017-06-02/a> | Xavier Mertens | Phishing Campaigns Follow Trends |
2016-11-23/a> | Tom Webb | Mapping Attack Methodology to Controls |