Backdoor deployment overtakes ransomware as top attacker action News Deployment of backdoors on networks was the top action attackers… rooter February 22, 2023 1 min read 0
7 Tips for Mitigating Cyber-Risks to Your Corporate Social Media News How to stay safe, even when tech-savvy admins can’t tell… rooter February 22, 2023 1 min read 0
4 Tips to Guard Against DDoS Attacks News Attackers are now using multiple types of distributed denial-of-service (DDoS)… rooter February 22, 2023 1 min read 0
Hasbro’s Latest Retro Indiana Jones Figure Chose Wisely News With Dial of Destiny on the way this summer, Hasbro… rooter February 22, 2023 1 min read 0
Apple Warns of 3 New Vulnerabilities Affecting iPhone, iPad, and Mac Devices News Apple has revised the security advisories it released last month to include… rooter February 22, 2023 1 min read 0
Spotify’s New ‘AI DJ’ Mimics the Worst Parts of Listening to the Radio News Spotify has unveiled a new feature to help curate your… rooter February 22, 2023 1 min read 0
CISA adds IBM Aspera Faspex and Mitel MiVoice to Known Exploited Vulnerabilities Catalog News US CISA added actively exploited flaws in IBM Aspera Faspex… rooter February 22, 2023 2 min read 0
What is Traffic Light Protocol? Here’s how it supports CISOs in sharing threat data News Traffic Light Protocol (TLP) was created to facilitate greater sharing… rooter February 22, 2023 1 min read 0
Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia News Shipping companies and medical laboratories in Asia have been the… rooter February 22, 2023 1 min read 0
3 Steps to Automate Your Third-Party Risk Management Program News If you Google “third-party data breaches” you will find many… rooter February 22, 2023 1 min read 0