Vulnerability Management & Cybersecurity Trends to Look For in 2025 Security Phew. What a year 2024 was. High-profile attacks, rapid digital… rooter January 27, 2025 1 min read 0
Brushing Scams With a Twist: What to Do When an Unexpected Package Asks You to Scan a QR Code News The FTC has reissued a consumer alert notifying people of… rooter January 27, 2025 1 min read 0
Celebrate Data Privacy Day: Practical Tips and Solutions to Protect Your Identity News Did you ever stop to think that your digital identity… rooter January 27, 2025 1 min read 0
New VPN Backdoor Security A newly discovered VPN backdoor uses some interesting tactics to… rooter January 27, 2025 2 min read 0
Privacy-Preserving Federated Learning – Future Collaboration and Continued Research Uncategorized This post is the final blog in a series on… January 27, 2025 1 min read 0
Do We Really Need The OWASP NHI Top 10? News The Open Web Application Security Project has recently introduced a… rooter January 27, 2025 1 min read 0
ESXi ransomware attacks use SSH tunnels to avoid detection News Threat actors behind ESXi ransomware attacks target virtualized environments using… rooter January 27, 2025 2 min read 0
Attackers allegedly stole $69 million from cryptocurrency platform Phemex News Crooks stole at least $69 million from Singapore-based cryptocurrency platform… rooter January 27, 2025 2 min read 0
GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities News A previously unknown threat actor has been observed copying the… rooter January 27, 2025 1 min read 0
MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks News Threat hunters have detailed an ongoing campaign that leverages a… rooter January 27, 2025 1 min read 0