That Time Tom Lehrer Pranked the NSA Security Bluesky thread. Here’s the paper, from 1957. Note reference 3. rooter July 28, 2025 1 min read 0
Virtual Environments Under Fire: Fire Ant Campaign Breaches VMware Systems Security A threat actor, codenamed Fire Ant, has targeted virtualization and… rooter July 28, 2025 1 min read 0
Microsoft SharePoint Zero-Day Security Chinese hackers are exploiting a high-severity vulnerability in Microsoft SharePoint… rooter July 28, 2025 1 min read 0
Weekly Update 462 Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter July 28, 2025 2 min read 0
What You Can’t See Will Breach You Security Why Continuous Visibility Is the Core of Modern Prevention In… rooter July 28, 2025 1 min read 0
SharePoint under fire: ToolShell attacks hit organizations worldwide Security The ToolShell bugs are being exploited by cybercriminals and APT… rooter July 26, 2025 1 min read 0
Friday Squid Blogging: Stable Quasi-Isodynamic Designs Security Yet another SQUID acronym: “Stable Quasi-Isodynamic Design.” It’s a stellarator… rooter July 25, 2025 1 min read 0
ToolShell: Remote Code Execution in Microsoft SharePoint (CVE-2025-53770) Security On July 19, 2025, a critical remote code execution (RCE)… rooter July 25, 2025 4 min read 0
Hackers Weaponize SharePoint 0-Day: Widespread Exploitation Ongoing Security A critical zero-day vulnerability chain, called “ToolShell,” is actively exploited… rooter July 25, 2025 1 min read 0
Subliminal Learning in AIs Security Today’s freaky LLM behavior: We study subliminal learning, a surprising… rooter July 25, 2025 1 min read 0