Hacking Scandinavian Alcohol Tax Security The islands of Åland are an important tax hack: Although… rooter October 30, 2023 1 min read 0
HackerOne awarded over $300 million bug hunters Security HackerOne announced that it has awarded over $300 million bug… rooter October 30, 2023 3 min read 0
StripedFly, a complex malware that infected one million devices without being noticed Security A sophisticated malware tracked as StripedFly remained undetected for five… rooter October 30, 2023 3 min read 0
Separation of Privilege (SoP) 101: Definition and Best Practices Cyber Security Separation of privilege is splitting up tasks and assigning rights… rooter October 30, 2023 1 min read 0
IT Army of Ukraine disrupted internet providers in territories occupied by Russia Security IT Army of Ukraine hacktivists have temporarily disrupted internet services… rooter October 29, 2023 3 min read 0
XDR vs. SIEM Security Enhanced Discovery and Resolution, or more commonly known as XDR,… rooter October 29, 2023 17 min read 0
What is MDR ? Security Gaining Insight: Decoding MDR’s Functions As we navigate the continually… rooter October 29, 2023 16 min read 0
What is Zero Trust Architecture (ZTA) ? Security Trust No One, Secure Everything: Unpacking Zero Trust Architecture In… rooter October 29, 2023 20 min read 0
What Is Progressive Delivery ? Security Delving Into the Essential Elements of Incremental Deployment Incremental deployment… rooter October 29, 2023 19 min read 0
Fend Off the Next Phishing Attack With A “Human Firewall.” Cyber Security Implement the ‘Mindset – Skillset – Toolset’ triad By Dr.… rooter October 29, 2023 1 min read 0