Cyberwar Lessons from the War in Ukraine Security The Aspen Institute has published a good analysis of the… rooter February 23, 2023 2 min read 0
Writing like a boss with ChatGPT and how to get better at spotting phishing scams Security It’s never been easier to write a convincing message that… rooter February 22, 2023 1 min read 0
Q4-2022 API ThreatStats™ Report Security We’re pleased to present the latest quarterly review and analysis… rooter February 22, 2023 5 min read 0
A Device to Turn Traffic Lights Green Security Here’s a story about a hacker who reprogrammed a device… rooter February 22, 2023 2 min read 0
ESET SMB Digital Security Sentiment Report: The damaging effects of a breach Security SMBs need to not only reduce their odds of being… rooter February 21, 2023 1 min read 0
Norway Seizes Stolen Crypto Funds Linked to the Lazarus Group Security In March 2022, the Lazarus Group, a North Korea-backed hacking… rooter February 21, 2023 1 min read 0
Norwegian Seize Stolen Crypto Funds Linked to the Lazarus Group Security In March 2022, the Lazarus Group, a North Korea-backed hacking… rooter February 21, 2023 1 min read 0
The Insecurity of Photo Cropping Security The Intercept has a long article on the insecurity of… rooter February 21, 2023 1 min read 0
Your Office Document is at Risk – XLL, A New Attack Vector Security Microsoft office documents are used worldwide by both corporates… rooter February 21, 2023 1 min read 0
Fool-proofing your Patch Management Plan to Ward-off Cyberattacks Security Patch management is a critical component of an organization’s overall… rooter February 21, 2023 1 min read 0