Five Tips to Securing Your Organization Through Your People. Cyber Security By Dr. Inka Karppinen, CPsychol. Lead Behavioural Scientist, CybSafe While… rooter August 16, 2023 1 min read 0
From Samsung to the Pentagon – Recent Stories Remind Us About the Importance of Sensitive Data Guardrails Cyber Security By Thomas Segura, Cyber Security Expert, GitGuardian The last few… rooter August 16, 2023 1 min read 0
UK Electoral Commission Hacked Security The UK Electoral Commission discovered last year that it was… rooter August 16, 2023 1 min read 0
Two unauthenticated stack buffer overflows found in Ivanti Avalanche EMM Security Ivanti Avalanche EMM product is impacted by two buffer overflows… rooter August 16, 2023 2 min read 0
Approximately 2000 Citrix NetScaler servers were backdoored in a massive campaign Security A threat actor has compromised roughly 2,000 Citrix NetScaler servers… rooter August 16, 2023 3 min read 0
Hawaii’s Gemini North Observatory Suspended After Cyberattack News It is unclear who the threat actors were or what… rooter August 15, 2023 1 min read 0
Burger King Serves Up Sensitive Data, No Mayo News The incident marks the second time since 2019 that a… rooter August 15, 2023 1 min read 0
Salesforce Zero-Day Exploited to Phish Facebook Credentials News The cyberattacks used the legitimate Salesforce.com domain by chaining the… rooter August 15, 2023 1 min read 0
Google, Microsoft Take Refuge in Rust Language’s Better Security News More tech giants are turning to the Rust programming language… rooter August 15, 2023 1 min read 0
How To Deal With the Vagueness in New Cyber Regulations News Recent regulations for privacy, AI, and breaches tend to be… rooter August 15, 2023 1 min read 0