Fooling a Voice Authentication System with an AI-Generated Voice Security A reporter used an AI synthesis of his own voice… rooter March 1, 2023 1 min read 0
ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022 Security And that’s just the tip of the iceberg when it… rooter March 1, 2023 1 min read 0
Australia Implements Stronger Cyber Security Measures Against Threats Security Following a series of major data breaches in Australia, the… rooter February 28, 2023 1 min read 0
Side-Channel Attack against CRYSTALS-Kyber Security CRYSTALS-Kyber is one of the public-key algorithms currently recommended by… rooter February 28, 2023 1 min read 0
Dutch Police arrests 3 men involved in a massive extortion scheme. One of them is an ethical hacker Security The Dutch police arrested three individuals as a result of… rooter February 27, 2023 4 min read 0
Banning TikTok Security Congress is currently debating bills that would ban TikTok in… rooter February 27, 2023 7 min read 0
How OSINT Can Save the Gaming Industry Security OSINT Can Save the Gaming Industry. The expansion of cybercrime… rooter February 27, 2023 1 min read 0
Coronavirus-themed Campaign delivers Agent Tesla Malware Security Summary: While the whole world fights against the COVID-19… rooter February 27, 2023 1 min read 0
Weekly Update 336 Security Presently sponsored by: Kolide ensures only secure devices can access… rooter February 26, 2023 2 min read 0
Friday Squid Blogging: Squid Processing Facility Security This video of a modern large squid processing ship is… rooter February 24, 2023 1 min read 0