Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack? Posted on September 13, 2023 The campaign started with a trojanized version of unsupported financial software
Eavesdropping on Phone Conversations Through Vibrations Security Researchers have managed to eavesdrop on cell phone voice conversations… rooter August 18, 2025 1 min read 0
How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe Security During the attack, the group deployed several tools, most notably… rooter September 30, 2023 1 min read 0
ChatGPT, will you be my Valentine? Security Spoiler alert: it turned me down. But that’s far from… rooter February 15, 2023 1 min read 0
MITRE and CISA release Caldera for OT attack emulation Security MITRE and CISA released a Caldera extension for OT that… rooter September 6, 2023 3 min read 0