Hello Alfred app exposes user data Security Hello Alfred, an in-home hospitality app, left a database accessible… rooter October 27, 2023 2 min read 0
What is Traffic Shaping ? Security Unraveling the Enigma of Traffic Modulation Within the realm of… rooter October 27, 2023 23 min read 0
iLeakage attack exploits Safari to steal data from Apple devices Security Boffins devised a new iLeakage side-channel speculative execution attack exploits… rooter October 26, 2023 3 min read 0
Cloudflare mitigated 89 hyper-volumetric HTTP distributed DDoS attacks exceeding 100 million rps Security Cloudflare mitigated thousands of hyper-volumetric HTTP distributed denial-of-service (DDoS) attacks… rooter October 26, 2023 2 min read 0
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers Security ESET Research recommends updating Roundcube Webmail to the latest available… rooter October 26, 2023 1 min read 0
Seiko confirmed a data breach after BlackCat attack Security Japanese watchmaker Seiko revealed that the attack that suffered earlier… rooter October 26, 2023 4 min read 0
New NSA Information from (and About) Snowden Security Interesting article about the Snowden documents, including comments from former… rooter October 26, 2023 2 min read 0
Winter Vivern APT exploited zero-day in Roundcube webmail software in recent attacks Security Russia-linked threat actor Winter Vivern has been observed exploiting a zero-day… rooter October 26, 2023 3 min read 0
Pwn2Own Toronto 2023 Day 1 – organizers awarded $438,750 in prizes Security The Pwn2Own Toronto 2023 hacking contest has begun and during… rooter October 25, 2023 2 min read 0
Application Layer Gateway (ALG) Explained: What it is & Why You Need it ? Security Snippet When you hear “Application Layer Gateway,” or ALG for… rooter October 25, 2023 12 min read 0