QR Code 101: What the Threats Look Like Posted on October 11, 2023 Because QR codes can be used for phishing as easily as an email or text can, organizations must remain vigilant when dealing with them.
Critical GitHub Vulnerability Exposes 4,000+ Repositories to Repojacking Attack News A new vulnerability disclosed in GitHub could have exposed thousands… rooter September 20, 2023 1 min read 0
Celebrating 25 Years of the CVE Program: Notes on our 5 Year Journey as a CVE Numbering Authority News As the Common Vulnerabilities and Exposures (CVE®) Program celebrates its… rooter October 22, 2024 1 min read 0
Google Open Sources Magika: AI-Powered File Identification Tool News Google has announced that it's open-sourcing Magika, an artificial intelligence (AI)-powered… rooter February 23, 2024 1 min read 0
Google’s New Restore Credentials Tool Simplifies App Login After Android Migration News Google has introduced a new feature called Restore Credentials to… rooter November 25, 2024 1 min read 0