Microsoft patches actively exploited Office zero-day vulnerability Security Executive Summary In a swift response to escalating cyber threats,… rooter January 28, 2026 1 min read 0
Critical GNU InetUtils Telnetd Vulnerability Allows Authentication Bypass and Root Access Security The discovery of CVE-2026-24061 exposes a long-standing critical weakness in… rooter January 27, 2026 1 min read 0
The Constitutionality of Geofence Warrants Security The US Supreme Court is considering the constitutionality of geofence… rooter January 27, 2026 1 min read 0
Weekly Update 488 Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter January 27, 2026 1 min read 0
Ireland Proposes Giving Police New Digital Surveillance Powers Security This is coming: The Irish government is planning to bolster… rooter January 26, 2026 1 min read 0
Friday Squid Blogging: Giant Squid in the Star Trek Universe Security Spock befriends a giant space squid in the comic Star… rooter January 23, 2026 1 min read 0
AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities Security Really interesting blog post from Anthropic: In a recent evaluation… rooter January 23, 2026 2 min read 0
Gmail Verified Blue Email Tick: What It Is & How to Get One Security If you’ve ever noticed a blue checkmark next to a… rooter January 23, 2026 2 min read 0
Why AI Keeps Falling for Prompt Injection Attacks Security Imagine you work at a drive-through restaurant. Someone drives up… rooter January 22, 2026 9 min read 0
Hackers Turn AWS Buckets into LastPass Phishing Lures to Steal Vault Credentials Security Executive Summary An ongoing phishing campaign is impersonating LastPass and… rooter January 22, 2026 1 min read 0