Weekly Update 435 Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter January 21, 2025 1 min read 0
Biden Signs New Cybersecurity Order Security President Biden has signed a new cybersecurity order. It has… rooter January 20, 2025 2 min read 0
Considerations for Selecting the Best API Authentication Option Security Implementing API authentication is one of the most critical stages… rooter January 20, 2025 6 min read 0
Ponzi Scams continue to entrap South Africans Security Ponzi schemes of all sorts are over 150 years old… rooter January 20, 2025 1 min read 0
Friday Squid Blogging: Opioid Alternatives from Squid Research Security Is there nothing that squid research can’t solve? “If you’re… rooter January 17, 2025 1 min read 0
Cloud Security Best Practices That Every User Should Implement Security The cloud has become a foundational element of modern business… rooter January 17, 2025 1 min read 0
Social Engineering to Disable iMessage Protections Security I am always interested in new phishing tricks, and watching… rooter January 17, 2025 1 min read 0
Critical Path Traversal Vulnerabilities (CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159) in Ivanti Endpoint Manager Security Ivanti, an IT management solutions, has identified and addressed four… rooter January 17, 2025 1 min read 0
Where to Buy Wildcard SSL Certificate: A Quick Guide Security In an age where online security is non-negotiable, businesses must… rooter January 17, 2025 2 min read 0
FBI Deletes PlugX Malware from Thousands of Computers Security According to a DOJ press release, the FBI was able… rooter January 16, 2025 1 min read 0