What is Traffic Light Protocol? Here’s how it supports CISOs in sharing threat data News Traffic Light Protocol (TLP) was created to facilitate greater sharing… rooter February 22, 2023 1 min read 0
Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia News Shipping companies and medical laboratories in Asia have been the… rooter February 22, 2023 1 min read 0
3 Steps to Automate Your Third-Party Risk Management Program News If you Google “third-party data breaches” you will find many… rooter February 22, 2023 1 min read 0
Attackers Flood NPM Repository with Over 15,000 Spam Packages Containing Phishing Links News In what’s a continuing assault on the open source ecosystem, over… rooter February 22, 2023 1 min read 0
Activision Confirms Data Breach Exposing Plans for Call of Duty, Employee Data News A data breach has exposed internal data of Activision, including… rooter February 22, 2023 2 min read 0
The Only Thing I Can Buy From Loewe’s Crazy Expensive Howl’s Moving Castle Line Is a Candle News All of sudden, it seems like luxury clothing brands have… rooter February 22, 2023 1 min read 0
New Phishing Attack Detection Attributed to the UAC-0050 and UAC-0096 Groups Spreading Remcos Spyware Threats February 2023 can be marked as a month of ongoing… rooter February 22, 2023 4 min read 0
ChatGPT: The Dark Side of Artificial Intelligence Crafting Custom Malware Cyber Security It’s easy to see why there has always been some… rooter February 22, 2023 1 min read 0
Five Million Downloads OyeTalk Android App Leaks Private User Conversations Cyber Security Cyber researchers warn OyeTalk users that the app`s database exposed… rooter February 22, 2023 1 min read 0
VMware addressed a critical bug in Carbon Black App Control News VMware released security updates to address a critical vulnerability, tracked… rooter February 22, 2023 2 min read 0