The Need for Trustworthy AI Security If you ask Alexa, Amazon’s voice assistant AI system, whether… rooter August 3, 2023 5 min read 0
Rapid7 found a bypass for the recently patched actively exploited Ivanti EPMM bug Security Researchers discovered a bypass for a recently fixed actively exploited… rooter August 3, 2023 3 min read 0
Russian APT29 conducts phishing attacks through Microsoft Teams Security Russia-linked APT29 group targeted dozens of organizations and government agencies… rooter August 3, 2023 3 min read 0
Ethical Web Scraping and Crawling: Navigating the Digital World Responsibly Security The wealth of data available on the internet and the… rooter August 3, 2023 1 min read 0
Hackers already installed web shells on 581 Citrix servers in CVE-2023-3519 attacks Security Researchers warn that hundreds of Citrix servers have been hacked… rooter August 2, 2023 4 min read 0
Zero-day in Salesforce email services exploited in targeted Facebook phishing campaign Security Experts spotted a spear-phishing Facebook campaign exploiting a zero-day vulnerability… rooter August 2, 2023 4 min read 0
Burger King forgets to put a password on their systems, again Security The fast food giant Burger King put their systems and… rooter August 2, 2023 3 min read 0
Beware of BOLA (IDOR) Vulnerabilities in Web Apps and APIs Security Introduction In a recent advisory, the Cybersecurity and Infrastructure Security… rooter August 2, 2023 4 min read 0
Self-Spreading Malware Infects Call of Duty Modern Warfare 2 Exploiting Known Bug Security For the past month, players of the classic game, Call… rooter August 2, 2023 1 min read 0
New SEC Rules around Cybersecurity Incident Disclosures Security The US Securities and Exchange Commission adopted final rules around… rooter August 2, 2023 1 min read 0