Skip to content
MA
Open to work

Hi, I'mMohammed AlYahya

Cybersecurity Leadership

Blog

apple delays plans to scan devices for child abuse images after privacy backlash

Apple Delays Plans to Scan Devices for Child Abuse Images After Privacy Backlash

Apple temporarily delays its controversial plans to screen users' devices for child sexual abuse material (CSAM) after privacy backlash. Source

Read Post
microsoft says chinese hackers were behind solarwinds serv u ssh 0 day attack

Microsoft Says Chinese Hackers Were Behind SolarWinds Serv-U SSH 0-Day Attack

Microsoft says Chinese hackers were responsible for SolarWinds Serv-U SSH 0-day attack. Source

Read Post
u s cyber command warns of ongoing attacks exploiting atlassian confluence flaw

U.S. Cyber Command Warns of Ongoing Attacks Exploiting Atlassian Confluence Flaw

US Cyber Command warns of ongoing attacks exploiting a recently disclosed vulnerability in Atlassian Confluence.   Source

Read Post
this new malware family using clfs log files to avoid detection

This New Malware Family Using CLFS Log Files to Avoid Detection

An emerging malware family uses CLFS log files to avoid detection.   Source

Read Post
fin7 hackers using windows 11 themed documents to drop javascript backdoor

FIN7 Hackers Using Windows 11 Themed Documents to Drop Javascript Backdoor

Hackers use Windows 11 Themed Documents in order to Drop Javascript Backdoors Source Source

Read Post