Moldovan citizen sentenced in connection with the E-Root cybercrime marketplace case Security US DoJ sentenced a Moldovan national (31) to 42 months… rooter March 15, 2024 2 min read 0
Threat intelligence explained | Unlocked 403: A cybersecurity podcast Security We break down the fundamentals of threat intelligence and its… rooter March 15, 2024 1 min read 0
Malicious open-source packages: Insights from Check Point’s Developer-First Head of Data Science Cyber Security Ori Abramovsky is the Head of Data Science of the… rooter March 15, 2024 7 min read 0
UK Defence Secretary jet hit by an electronic warfare attack in Poland Security Russian hackers have knocked down the GPS and communications of… rooter March 15, 2024 3 min read 0
Detect ALPHA SPIDER Ransomware Attacks: TTPs Leveraged by ALPHV aka BlackCat RaaS Operators Threats Ransomware remains a top threat to organizations globally, with a… rooter March 15, 2024 5 min read 0
Improving C++ Security C++ guru Herb Sutter writes about how we can improve… rooter March 15, 2024 1 min read 0
The Future of Engineering: Advanced Revit MEP Drafting Cyber Security In the world of engineering, constant innovation is paramount. One… rooter March 15, 2024 1 min read 0
Cisco fixed high-severity elevation of privilege and DoS bugs Security Cisco this week addressed high-severity elevation of privilege and denial-of-service… rooter March 14, 2024 3 min read 0
Recent DarkGate campaign exploited Microsoft Windows zero-day Security Researchers recently uncovered a DarkGate campaign in mid-January 2024, which… rooter March 14, 2024 4 min read 0
The CISO Role Is Changing. Can CISOs Themselves Keep Up? News What happens to security leaders that don't communicate security well… rooter March 14, 2024 1 min read 0