E-mail Compromise Cyber Security How to protect business against BEC-attacks By Sergio Bertoni, The… rooter November 28, 2023 1 min read 0
Malware Uses Trigonometry to Track Mouse Strokes News The latest LummaC2 infostealer version includes a novel anti-sandbox trick… rooter November 28, 2023 1 min read 0
DPRK Hackers Masquerade as Tech Recruiters, Job Seekers News No one has turned the job market into an attack… rooter November 28, 2023 1 min read 0
Inside Job: Cyber Exec Admits to Hospital Hacks News Healthcare cyber services executive Vikas Singla admits to hobbling hospital… rooter November 28, 2023 1 min read 0
AutoZone Files MOVEit Data Breach Notice With State of Maine News The company temporarily disabled the application and patched the vulnerability,… rooter November 28, 2023 1 min read 0
4 key insights: The new global AI cyber security guidelines Cyber Security EXECUTIVE SUMMARY: The first global agreement of its kind, eighteen… rooter November 28, 2023 3 min read 0
Digital Car Keys Are Coming Security Soon we will be able to unlock and start our… rooter November 28, 2023 1 min read 0
International police operation dismantled a prominent Ukraine-based Ransomware group Security An international law enforcement operation dismantled the core of a… rooter November 28, 2023 2 min read 0
What Healthcare Cybersecurity Leaders Should Know About the FDA’s Section 524B Guidelines News New cybersecurity regulations from the FDA outline specific steps that… rooter November 28, 2023 1 min read 0
AI Helps Uncover Russian State-Sponsored Disinformation in Hungary News Researchers used machine learning to analyze Hungarian media reports and… rooter November 28, 2023 1 min read 0