DNS Tunneling Abuse Expands to Tracking & Scanning Victims News Several campaigns are leveraging the evasive tactic to provide useful… rooter May 17, 2024 1 min read 0
There Isn't a Cyber Labor Shortage News There are plenty of valuable candidates on the market. Hiring… rooter May 17, 2024 1 min read 0
500 Victims In, Black Basta Reinvents With Novel Vishing Strategy News Ransomware groups have always created problems for their victims that… rooter May 17, 2024 1 min read 0
Heartbleed: When Is It Good to Name a Vulnerability? News Ten years have passed since Heartbleed was first identified, but… rooter May 17, 2024 1 min read 0
Ukrainian, Latvian TV Hijacked to Broadcast Russian Celebrations News At least 15 television channels were interrupted in Ukraine alone,… rooter May 17, 2024 1 min read 0
IntelBroker Nabs Europol Info; Agency Investigating News Europe's cross-border law enforcement agency says the well-known hacking outfit,… rooter May 17, 2024 1 min read 0
Why Tokens Are Like Gold for Opportunistic Threat Actors News When setting authentication token expiry policies, always lean in to… rooter May 17, 2024 1 min read 0
Millions of IoT Devices at Risk From Flaws in Integrated Cellular Modem News Researchers discovered seven vulnerabilities — including an unauthenticated RCE issue… rooter May 17, 2024 1 min read 0
CISO as a CTO: When and Why It Makes Sense News Enterprises are increasingly recognizing that a CISO's skills and experience… rooter May 17, 2024 1 min read 0
Is CISA's Secure by Design Pledge Toothless? News CISA's agreement is voluntary and, frankly, basic. Signatories say that's… rooter May 17, 2024 1 min read 0