Iranian hackers breached Albania’s Institute of Statistics (INSTAT) Security Albania’s Institute of Statistics (INSTAT) announced that it was targeted… rooter February 3, 2024 4 min read 0
How to Use a VPN to Protect Your Online Privacy Cyber Security Learn how to use a VPN to protect your online… rooter February 3, 2024 1 min read 0
Expert Insight: Vanessa Horton on Anti-Forensics Cyber Security How attackers try to remain undetected and/or mask their actions… rooter February 2, 2024 6 min read 0
Friday Squid Blogging: Illex Squid in Argentina Waters Security Argentina is reporting that there is a good population of… rooter February 2, 2024 1 min read 0
Proactive CISO strategies for Akira ransomware prevention & defense Cyber Security EXECUTIVE SUMMARY: In March of 2023, the first Akira ransomware… rooter February 2, 2024 5 min read 0
David Kahn Security David Kahn has died. His groundbreaking book, The Codebreakers was… rooter February 2, 2024 1 min read 0
PoC Exploits Heighten Risks Around Critical New Jenkins Vuln News The arbitrary file-read flaw can lead to remote code execution. rooter February 2, 2024 1 min read 0
SolarWinds Files Motion to Dismiss SEC Lawsuit News Responding to SEC charges, SolarWinds fired back with a detailed… rooter February 2, 2024 1 min read 0
A Cyber Insurer’s Perspective on How to Avoid Ransomware News Insurance companies have a unique view of the ravages of… rooter February 2, 2024 1 min read 0
Iran’s ‘Cyber Centers’ Dodge Sanctions to Sell Cyber Operations News Networks of Iranian officials and cyber-offensive specialists have created a… rooter February 2, 2024 1 min read 0