4 Steps for Shifting Left & Winning the Cybersecurity Battle Posted on April 3, 2023 If companies prioritize communications and make the DevOps process more transparent, team members will better know what vulnerabilities to look for.
Microsoft-Signed Chinese Adware Opens the Door to Kernel Privileges News An official stamp of approval might give the impression that… rooter July 18, 2024 1 min read 0
Apache OpenMeetings Web Conferencing Tool Exposed to Critical Vulnerabilities News Multiple security flaws have been disclosed in Apache OpenMeetings, a… rooter July 20, 2023 1 min read 0
In a First, Feds Fine JetBlue for Chronically Delaying Flights News The fine is the first of its kind, but just… rooter January 3, 2025 1 min read 0
DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse News North Korean hackers break ground with new exploitation techniques for… rooter April 18, 2024 1 min read 0