AWS Outage: Lessons Learned Security What can we learn from the recent AWS outage, and… rooter October 21, 2025 13 min read 0
Inside the Synthient Threat Data Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter October 21, 2025 10 min read 0
AWS Outage: A Supply-Chain Security Lesson Cyber Security It sometimes seems that each new supply-chain security breach we… rooter October 21, 2025 6 min read 0
Global Encryption Day: Why Encryption Is a Core Requirement Cyber Security Today, 21 October, is Global Encryption Day. Led by the… rooter October 21, 2025 6 min read 0
Key API Security Takeaways from the Postman 2025 State of API Report Security API security has never been more important because modern APIs… rooter October 21, 2025 14 min read 0
Key API Security Takeaways from the Postman 2025 State of API Report Security API security has never been more important because modern APIs… rooter October 21, 2025 14 min read 0
Weekly Update 474 Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter October 20, 2025 2 min read 0
Email Bombs Exploit Lax Authentication in Zendesk News Cybercriminals are abusing a widespread lack of authentication in the… rooter October 17, 2025 3 min read 0
CVE-2025-59230 and CVE-2025-24990 Vulnerabilities: New Windows Zero-Days Under Active Exploitation Threats Hot on the heels of the disclosure of CVE-2025-11001 and… rooter October 16, 2025 4 min read 0
API Attack Awareness: When Authentication Fails — Exposing APIs to Risk Security Authentication issues seem like low-level attacks. But authentication today –… rooter October 16, 2025 5 min read 0