Unrestricted Upload of File with Dangerous Type vulnerability in ZealousWeb Generate PDF using Contact Form 7.This issue affects Generate PDF using Contact Form 7: from n/a through 4.0.6.

Security Links is a curated list of websites for cybersecurity. Find cutting edge information and trends.

LATEST NEWS
PICKUP

Red Teaming and offensive stuff.

NEW

We discuss hot topics, malware behavior, techniques, practices for analyzing malicious files, and of course, we will talk more about our online interactive sandbox.

NEW

Discover RTT, the leading resource for Red Team Tools, Techniques, and Commands. Stay ahead of advanced persistent threats (by MITRE) with insights and guidance from seasoned security professionals. Explore now at rtt.secdu.de.

Security - Free source code and tutorials for Software developers and Architects."

Blackwing Intelligence provides high-end security engineering, analysis, and research services for engineering focused organizations.

Researchers in the Lookout Threat Lab leverage the world’s largest mobile telemetry dataset to track APT activity, discover new mobile malware, and provide actionable intelligence.

NEW

Understandable online privacy & cybersecurity information to keep you and your data safe. Latest cybersecurity research & trends.

Upload a ransom note and/or sample encrypted file to identify the ransomware that has encrypted your data.

RECENTLY ADDED
NEW

The latest information and archives of advisories.

NEW

Risky Business publishes cybersecurity newsletters and podcasts for security professionals.

NEW

The Barracuda blog brings you the latest news, research, and insights you can’t get anywhere else.

NEW

Gain valuable insights for analysts, threat hunters, and SecOps professionals with our cybersecurity blog! Explore all posts or browse by category.

NEW

Blog from Bedrock. Bedrock Security is at the forefront of revolutionizing data security in the cloud and GenAI era.

NEW

CheckMates is the Cyber Security Community that brings Check Point users, experts, and R&D together for freewheeling discussions about Check Point.

NEW

Rapid7's cybersecurity experts break down the latest vulnerabilities, exploits, and attacks. Detect threats faster with trusted news, insights & threat intel.

NEW

Get the latest dark web intelligence & cybersecurity insights from our experts - from industry trends to tips on new attack techniques. Find out more.

NEW

Blog from ThreatMon. ThreatMon is a technology company that specializes in delivering comprehensive cybersecurity solutions tailored to the specific needs of businesses. ThreatMon delivers an intelligence-driven cybersecurity solution. Established in 2018, our company is devoted to safeguarding digital assets from external threats. Our cutting-edge cybersecurity solutions, meticulously crafted by experienced professionals, seamlessly integrate Threat Intelligence, External Attack Surface Management, and Dark Web Intelligencen. By leveraging these technologies, we proactively identify vulnerabilities and provide tailored security solutions to our clients.

NEW

Get the intelligence you need to detect, prevent & respond to cyber threats. Read the Intel 471 cyber threat intelligence blog.

NEW

Frontline Mandiant investigations, expert analysis, tools and guidance, and in-depth security research.

NEW

Learn how to protect your ML advantage. Check out HiddenLayer’s recent releases, announcements, and musings on protecting your algorithms.