Protecting Model Updates in Privacy-Preserving Federated Learning Cyber Security In our second post we described attacks on models and… rooter March 21, 2024 1 min read 0
FCC Approves Voluntary Cyber Trust Labels for Consumer IoT Products News Here's what IoT device manufacturers need to know to earn… rooter March 21, 2024 1 min read 0
Fortinet Warns of Yet Another Critical RCE Flaw News CVE-2024-48788, like many other recent Fortinet flaws, will likely be… rooter March 21, 2024 1 min read 0
Alabama Under DDoS Cyberattack by Russian-Backed Hacktivists News The hacktivist group Anonymous Sudan claims credit for a cyberattack… rooter March 21, 2024 1 min read 0
TikTok Ban Raises Data Security, Control Questions News Approved by the House and moving on to the Senate,… rooter March 21, 2024 1 min read 0
Malawi Passport System Back Online After Debilitating Cyberattack News Passport printing and distribution will resume first in Lilongwe as… rooter March 21, 2024 1 min read 0
Windows SmartScreen Bypass Flaw Exploited to Drop DarkGate RAT News Attackers use Google redirects in their phishing attack leveraging a… rooter March 21, 2024 1 min read 0
How to Identify a Cyber Adversary: What to Look For News There are many factors involved in attributing a cyber incident… rooter March 21, 2024 1 min read 0
150K+ UAE Network Devices & Apps Found Exposed Online News Misconfigurations, insecure services leave United Arab Emirates organizations and critical… rooter March 21, 2024 1 min read 0
AI Transforming Manufacturing Innovation, Branding, and Customer Interactions Cyber Security Here, I will talk about how generative artificial intelligence is… rooter March 21, 2024 1 min read 0