Black Hat 2023: Cyberwar fire-and-forget-me-not Security What happens to cyberweapons after a cyberwar? rooter September 13, 2023 1 min read 0
Mass-spreading campaign targeting Zimbra users Security ESET researchers have observed a new phishing campaign targeting users… rooter September 13, 2023 1 min read 0
Telekopye: Hunting Mammoths using Telegram bot Security Analysis of Telegram bot that helps cybercriminals scam people on… rooter September 13, 2023 1 min read 0
Check cybersecurity pre-invest – Week in security with Tony Anscombe Security When you invest in a company, do you check its… rooter September 13, 2023 1 min read 0
MoustachedBouncer: Espionage against foreign diplomats in Belarus Security Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular… rooter September 13, 2023 1 min read 0
Time is money, and online game scammers have lots of it Security Gamers and cybersecurity professionals have something in common – the… rooter September 13, 2023 1 min read 0
Is backdoor access oppressive? – Week in security with Tony Anscombe Security Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals,… rooter September 13, 2023 1 min read 0
The grand theft of Jake Moore’s voice: The concept of a virtual kidnap Security With powerful AI, it doesn’t take much to fake a… rooter September 13, 2023 1 min read 0
Fingerprints all over: Can browser fingerprinting increase website security? Security Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing… rooter September 13, 2023 1 min read 0
Quantum computing: Will it break crypto security within a few years? Security Current cryptographic security methods watch out – quantum computing is… rooter September 13, 2023 1 min read 0