IT Governance Podcast 25.8.23: Tesla, Duolingo, Lapsus$ trial Cyber Security This week, we discuss “insider wrongdoing” at Tesla, a data… rooter August 24, 2023 1 min read 0
What is Clone Phishing and How Do I Avoid It? News What is Clone Phishing and How Do I Avoid It?… rooter August 24, 2023 6 min read 0
What To Do with Old Computers to Protect Your Identity News What To Do with Old Computers to Protect Your Identity… rooter August 24, 2023 10 min read 0
Debt Snowball or Debt Avalanche: Which Debt Repayment Method is Right for You? News Debt Snowball or Debt Avalanche: Which Debt Repayment Method is… rooter August 24, 2023 10 min read 0
7 Internet Safety Tips for Safer Internet Browsing News 7 Internet Safety Tips for Safer Internet Browsing IdentityIQ With… rooter August 24, 2023 8 min read 0
CISOs Tout SaaS Cybersecurity Confidence, But 79% Admit to SaaS Incidents, New Report Finds News A new State of SaaS Security Posture Management Report from SaaS cybersecurity… rooter August 24, 2023 1 min read 0
Carderbee Attacks: Hong Kong Organizations Targeted via Malicious Software Updates News A previously undocumented threat cluster has been linked to a… rooter August 24, 2023 1 min read 0
New Variant of XLoader macOS Malware Disguised as ‘OfficeNote’ Productivity App News A new variant of an Apple macOS malware called XLoader has surfaced in the… rooter August 24, 2023 1 min read 0
Ivanti Warns of Critical Zero-Day Flaw Being Actively Exploited in Sentry Software News Software services provider Ivanti is warning of a new critical zero-day flaw… rooter August 24, 2023 1 min read 0
Critical Adobe ColdFusion Flaw Added to CISA’s Exploited Vulnerability Catalog News The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical… rooter August 24, 2023 1 min read 0