South Korean Police Deploy Deepfake Detection Tool in Run-up to Elections News The nation's battle with political deepfakes may be a harbinger… rooter March 14, 2024 1 min read 0
Russia-Sponsored Cyberattackers Infiltrate Microsoft’s Code Base News The Midnight Blizzard APT is mounting a sustained, focused cyber… rooter March 14, 2024 1 min read 0
Stealth Bomber: Atlassian Confluence Exploits Drop Web Shells In-Memory News The proof-of-concept exploits for Atlassian Confluence would enable arbitrary code… rooter March 14, 2024 1 min read 0
Creating Security Through Randomness News How lava lamps, pendulums, and suspended rainbows keep the Internet… rooter March 14, 2024 1 min read 0
The Ongoing Struggle to Protect PLCs News A decade after Stuxnet, vulnerabilities in OT systems and programmable… rooter March 14, 2024 1 min read 0
NSA’s Zero-Trust Guidelines Focus on Segmentation News Zero-trust architectures are essential protective measures for the modern enterprise.… rooter March 14, 2024 1 min read 0
Nigerian National Pleads Guilty of Conspiracy in BEC Operation News The defendant targeted victims, along with co-conspirators, to trick them… rooter March 14, 2024 1 min read 0
How to Ensure Open Source Packages Are Not Landmines News CISA and OpenSSF jointly published new guidance recommending technical controls… rooter March 14, 2024 1 min read 0
JetBrains TeamCity Mass Exploitation Underway, Rogue Accounts Thrive News Just one day after disclosure, adversaries began targeting the vulnerabilities… rooter March 14, 2024 1 min read 0
How to share sensitive files securely online Security Here are a few tips for secure file transfers and… rooter March 14, 2024 1 min read 0