Where Hackers Find Your Weak Spots News The five intelligence sources that power social engineering scams. rooter April 29, 2024 1 min read 0
Zero Trust Takes Over: 63% of Orgs Implementing Globally News Though organizations are increasingly incorporating zero-trust strategies, for many, these… rooter April 29, 2024 1 min read 0
MITRE ATT&CKED: InfoSec’s Most Trusted Name Falls to Ivanti Bugs News The irony is lost on few, as a nation-state threat… rooter April 29, 2024 1 min read 0
Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar News An open direct vulnerability in the Nespresso Web domain lets… rooter April 29, 2024 1 min read 0
ToddyCat APT Is Stealing Data on ‘Industrial Scale’ News The threat actor is deploying multiple connections into victim environments… rooter April 29, 2024 1 min read 0
Licensed to Bill? Nations Mandate Certification & Licensure of Cybersecurity Pros News Malaysia, Singapore, and Ghana are among the first countries to… rooter April 29, 2024 1 min read 0
Teetering on the Edge: VPNs, Firewalls’ Nonexistent Telemetry Lures APTs News State-sponsored groups are targeting critical vulnerabilities in virtual private network… rooter April 29, 2024 1 min read 0
Russia’s Fancy Bear Pummels Windows Print Spooler Bug News The infamous Russian threat actor has created a custom tool… rooter April 29, 2024 1 min read 0
Sophos Endpoint: Adaptive Attack Protection Gets Even Better News Sophos continues to deliver the strongest endpoint protection in the… rooter April 29, 2024 1 min read 0
Showcasing Artwork by Max for Autism Awareness Month News New pop-up art display honors Autism Awareness Month at Sophos… rooter April 26, 2024 1 min read 0