ESET Research Podcast: Sextortion, digital usury and SQL brute-force Posted on September 13, 2023 Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
Over 3,000 Android Malware spotted using unsupported/unknown compression methods to avoid detection Security Threat actors are using Android Package (APK) files with unsupported… rooter August 19, 2023 3 min read 0
Black Hat USA 2024 recap – Week in security with Tony Anscombe Security Unsurprisingly, many discussions focused on the implications of the recent… rooter August 10, 2024 1 min read 0
NSA AI Security Center Security The NSA is starting a new artificial intelligence security center:… rooter October 2, 2023 1 min read 0
Inconsistencies in the Common Vulnerability Scoring System (CVSS) Security Interesting research: Shedding Light on CVSS Scoring Inconsistencies: A User-Centric… rooter September 5, 2023 2 min read 0