One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe Security With the conflict in Ukraine passing the one-year mark, have… rooter February 24, 2023 1 min read 0
A year of wiper attacks in Ukraine Security ESET Research has compiled a timeline of cyberattacks that used… rooter February 24, 2023 1 min read 0
Putting Undetectable Backdoors in Machine Learning Models Security This is really interesting research from a few months ago:… rooter February 24, 2023 3 min read 0
Expiro: Old Virus Poses a New Challenge Security A recent virus infection faced by some users was swiftly… rooter February 24, 2023 1 min read 0
WinorDLL64: A backdoor from the vast Lazarus arsenal? Security The targeted region, and overlap in behavior and code, suggest… rooter February 23, 2023 1 min read 0
Acunetix improves default roles Security A new Acunetix Premium update has been released for Windows… rooter February 23, 2023 1 min read 0
Cyberwar Lessons from the War in Ukraine Security The Aspen Institute has published a good analysis of the… rooter February 23, 2023 2 min read 0
Writing like a boss with ChatGPT and how to get better at spotting phishing scams Security It’s never been easier to write a convincing message that… rooter February 22, 2023 1 min read 0
Q4-2022 API ThreatStats™ Report Security We’re pleased to present the latest quarterly review and analysis… rooter February 22, 2023 5 min read 0
A Device to Turn Traffic Lights Green Security Here’s a story about a hacker who reprogrammed a device… rooter February 22, 2023 2 min read 0