5 signs you’ve fallen for a scam – and what to do next Security Here’s how to know you have fallen victim to a… rooter March 14, 2023 1 min read 0
Fake ChatGPT browser extension is hijacking Facebook Business accounts Security A fake ChatGPT extension named “Quick access to ChatGPT” has… rooter March 13, 2023 1 min read 0
Custom Scripting in SanerNow to Remediate Zero-day Vulnerabilities Security A Zero-day vulnerability is a security risk that’s unknown to… rooter March 13, 2023 1 min read 0
The Art of Cyber Security Written in ancient China, Sun Tzu’s The Art of War… rooter March 12, 2023 1 min read 0
Weekly Update 338 Security Presently sponsored by: Kolide ensures only secure devices can access… rooter March 11, 2023 2 min read 0
APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe Security A request to move an online conversation to a supposedly… rooter March 11, 2023 1 min read 0
Common WhatsApp scams and how to avoid them Security Here’s a roundup of some of the most common tricks… rooter March 11, 2023 1 min read 0
Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific Security Chinese squid fishing boats are overwhelming Ecuador and Peru. As… rooter March 10, 2023 1 min read 0
Elephant Hackers Security An elephant uses its right-of-way privileges to stop sugar-cane trucks… rooter March 10, 2023 1 min read 0
Uncover and Remediate the Unexplored Risks with Continuous Posture Anomaly Management! Security Getting visibility into IT infrastructure is a fundamental practice to… rooter March 10, 2023 1 min read 0