Story of an Undercover CIA Agent who Penetrated Al Qaeda Security Rolling Stone has a long investigative story (non-paywalled version here)… rooter August 21, 2024 1 min read 0
Vulnerability Management Workflow Security Vulnerability Management, the name itself says it all. We all… rooter August 21, 2024 1 min read 0
Hacking Wireless Bicycle Shifters Security This is yet another insecure Internet-of-things story, this one about… rooter August 20, 2024 1 min read 0
Fraud Investment Scams That Appear Legitimate Security With the advent of the internet there have been an… rooter August 20, 2024 1 min read 0
Announcing new EDR capabilities for Webroot Endpoint Protection Security Introducing key EDR functionality In today’s rapidly evolving cyber landscape,… rooter August 19, 2024 3 min read 0
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF Security The Other Crowdstrike Outage On July 19, 2024, a flawed… rooter August 19, 2024 7 min read 0
The State of Ransomware Security Palo Alto Networks published its semi-annual report on ransomware. From… rooter August 19, 2024 1 min read 0
Weekly Update 413 Security Presently sponsored by: SentinelOne: Our agentless Offensive Security Engine automates… rooter August 18, 2024 2 min read 0
How a BEC scam cost a company $60 Million – Week in security with Tony Anscombe Security Business email compromise (BEC) has once again proven to be… rooter August 17, 2024 1 min read 0
Friday Squid Blog: The Market for Squid Oil Is Growing Security How did I not know before now that there was… rooter August 16, 2024 1 min read 0