Exfiltrator-22, a New Post-exploitation Kit for Sale Cyber Security Exfiltrator-22 is a new post-exploitation kit that can spread ransomware… rooter February 28, 2023 1 min read 0
Application Security vs. API Security: What is the difference? News As digital transformation takes hold and businesses become increasingly reliant… rooter February 28, 2023 1 min read 0
Personal Data of Stanford University PHD applicants exposed in data breach News The information of 897 people who applied to Stanford University’s… rooter February 28, 2023 3 min read 0
Biden-Harris Administration Launches First CHIPS for America Funding Opportunity News As part of implementing the bipartisan CHIPS and Science Act,… rooter February 28, 2023 1 min read 0
How to de-risk your digital ecosystem News Companies rightly see much promise for future revenues and productivity… rooter February 28, 2023 1 min read 0
Economic pressures are increasing cybersecurity risks; a recession would amp them up more News Predictions on whether or when the global economy will fall… rooter February 28, 2023 1 min read 0
Hackers Leak Data Allegedly Stolen in Activision Breach News Hackers have started leaking data allegedly stolen in a December… rooter February 28, 2023 2 min read 0
APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in Colombia News The threat actor known as Blind Eagle has been linked… rooter February 28, 2023 1 min read 0
Resecurity identified the investment scam network ‘Digital Smoke’ News Resecurity identified one of the largest investment fraud networks, tracked… rooter February 28, 2023 6 min read 0
CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability News The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity… rooter February 28, 2023 1 min read 0