Student Loan Breach Exposes 2.5M Records Threats 2.5 million people were affected, in a breach that could… rooter February 15, 2023 1 min read 0
Watering Hole Attacks Push ScanBox Keylogger Threats Researchers uncover a watering hole attack likely carried out by… rooter February 15, 2023 1 min read 0
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms Threats Over 130 companies tangled in sprawling phishing campaign that spoofed… rooter February 15, 2023 1 min read 0
Ransomware Attacks are on the Rise Threats Lockbit is by far this summer’s most prolific ransomware group,… rooter February 15, 2023 1 min read 0
Cybercriminals Are Selling Access to Chinese Surveillance Cameras Threats Tens of thousands of cameras have failed to patch a… rooter February 15, 2023 1 min read 0
Data Classification for NPO’s Security A data classification system is a method of organising and… rooter February 15, 2023 1 min read 0
Tik Tok and the Increase in Young Girls on the Platform. Security A large percentage of Tik Tok users are young girls,… rooter February 15, 2023 1 min read 0
Load shedding and Cybersecurity Security Load shedding can make it difficult for businesses to maintain… rooter February 15, 2023 1 min read 0
Application Security Testing Security Application Security Testing has become a well developed and automated… rooter February 15, 2023 1 min read 0
WordPress <= 6.1.1 – Unauth. Blind SSRF vulnerability Security This WordPress vulnerability is described as an unauthenticated blind Server-Side… rooter February 15, 2023 1 min read 0