10 Key Controls to Show Your Organization Is Worthy of Cyber Insurance News More-effective cyber-risk management controls can help bolster a company's policy… rooter August 17, 2023 1 min read 0
The Problem With Cybersecurity (and AI Security) Regulation News Are we really improving security, or are we just imposing… rooter August 17, 2023 1 min read 0
Citrix Zero-Day: 7K Instances Remain Exposed, 460 Compromised News Many organizations have failed to patch a critical zero-day vulnerability,… rooter August 17, 2023 1 min read 0
Custom Yashma Ransomware Crashes Into the Scene News The threat actor is targeting organizations in Bulgaria, China, Vietnam,… rooter August 17, 2023 1 min read 0
Raft of TETRA Zero-Day Vulnerabilities Endanger Industrial Communications News Further TETRA-related vulnerabilities have been disclosed in base stations that… rooter August 17, 2023 1 min read 0
Apple Users See Big Mac Attack, Says Accenture News Accenture's Cyber Threat Intelligence unit has observed a tenfold rise… rooter August 17, 2023 1 min read 0
Cyber Alert: Global Campaign Targets LinkedIn Accounts Cyber Security In a sweeping global campaign, LinkedIn users are falling victim… rooter August 17, 2023 1 min read 0
The Client/Server Relationship — A Match Made In Heaven Security This blog post was co-authored with Charlie Clark and Andrew… rooter August 17, 2023 1 min read 0
Detecting “Violations of Social Norms” in Text with AI Security Researchers are trying to use AI to detect “social norms… rooter August 17, 2023 1 min read 0
Raccoon Stealer 2.3.0 Malware – A Stealthier Comeback Cyber Security In a notable comeback, the creators of the notorious Raccoon… rooter August 17, 2023 1 min read 0