How North American SMBs Can Leverage Vulnerability Management to Stay Secure Security Stopping cyberattacks isn’t easy, but preventing them can be if… rooter September 6, 2024 1 min read 0
Long Analysis of the M-209 Security Really interesting analysis of the American M-209 encryption device and… rooter September 5, 2024 1 min read 0
Security Researcher Sued for Disproving Government Statements Security This story seems straightforward. A city is the victim of… rooter September 4, 2024 1 min read 0
Zyxel Users Beware: Critical OS Command Injection Flaw Threatens Routers Security Zyxel, a communications company, has released an advisory warning users… rooter September 4, 2024 1 min read 0
API Attack Surface: How to secure it and why it matters Security Managing an organization’s attack surface is a complex problem involving… rooter September 3, 2024 8 min read 0
List of Old NSA Training Videos Security The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists… rooter September 3, 2024 1 min read 0
The Expanding Threat of AI-Generated Deepfakes Security In an increasingly digital world, the rise of AI-generated deepfakes… rooter September 3, 2024 1 min read 0
SQL Injection Attack on Airport Security Security Interesting vulnerability: …a special lane at airport security called Known… rooter September 2, 2024 2 min read 0
Weekly Update 415 Security Presently sponsored by: 1Password Extended Access Management: Secure every sign-in… rooter September 1, 2024 2 min read 0
Friday Squid Blogging: Economic Fallout from Falklands Halting Squid Fishing Security Details. Blog moderation policy. rooter August 30, 2024 1 min read 0