whoAMI attack could allow remote code execution within AWS account News Researchers warn that the whoAMI attack lets attackers publish an… rooter February 17, 2025 3 min read 0
Gaming or gambling? Lifting the lid on in-game loot boxes Security The virtual treasure chests and other casino-like rewards inside your… rooter February 17, 2025 1 min read 0
What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10) Security Ever wondered what it’s like to hack for a living… rooter February 17, 2025 1 min read 0
Neil Lawrence: What makes us unique in the age of AI | Starmus highlights Security As AI advances at a rapid clip, reshaping industries, automating… rooter February 17, 2025 1 min read 0
How AI-driven identify fraud is causing havoc Security Deepfake fraud, synthetic identities, and AI-powered scams make identity theft… rooter February 17, 2025 1 min read 0
Patch or perish: How organizations can master vulnerability management Security Don’t wait for a costly breach to provide a painful… rooter February 17, 2025 1 min read 0
How scammers are exploiting DeepSeek’s rise Security As is their wont, cybercriminals waste no time launching attacks… rooter February 17, 2025 1 min read 0
This month in security with Tony Anscombe – January 2025 edition Security DeepSeek’s bursting onto the AI scene, apparent shifts in US… rooter February 17, 2025 1 min read 0
Untrustworthy AI: How to deal with data poisoning Security You should think twice before trusting your AI assistant, as… rooter February 17, 2025 1 min read 0
Roeland Nusselder: AI will eat all our energy, unless we make it tiny | Starmus highlights Security Left unchecked, AI’s energy and carbon footprint could become a… rooter February 17, 2025 1 min read 0