PIPEDREAM Malware against Industrial Control Systems Security Another nation-state malware, Russian in origin: In the early stages… rooter May 9, 2023 1 min read 0
Bluefield University Falls Victim to AvosLocker Ransomware Attack Security Bluefield University recently fell victim to a ransomware attack perpetrated… rooter May 9, 2023 1 min read 0
Navigating the Patch Management Lifecycle: From Identification to Validation Security Given the constant evolution and increasing sophistication of cyber-attacks, it… rooter May 9, 2023 1 min read 0
How the war in Ukraine has been a catalyst in private‑public collaborations Security As the war shows no signs of ending and cyber-activity… rooter May 9, 2023 1 min read 0
New CACTUS ransomware appeared in the threat landscape Security Researchers warn of a new ransomware family called CACTUS that… rooter May 9, 2023 3 min read 0
AI Hacking Village at DEF CON This Year Security At DEF CON this year, Anthropic, Google, Hugging Face, Microsoft,… rooter May 8, 2023 1 min read 0
BEWARE: Fake Applications are Disguised as Legitimate Ones Security In the world of cybercrime, the tactics used by threat… rooter May 8, 2023 1 min read 0
Friday Squid Blogging: “Mediterranean Beef Squid” Hoax Security The viral video of the “Mediterranean beef squid”is a hoax.… rooter May 5, 2023 1 min read 0
APTs target MSP access to customer networks – Week in security with Tony Anscombe Security The recent compromise of the networks of several companies via… rooter May 5, 2023 1 min read 0
Weekly Update 346 Security Presently sponsored by: Kolide ensures only secure devices can access… rooter May 5, 2023 2 min read 0