Cyber insurance: What is it and does my company need it? Security While not a ‘get out of jail free card’ for… rooter June 13, 2023 1 min read 0
Identifying the Idaho Killer Security The New York Times has a long article on the… rooter June 13, 2023 2 min read 0
Vulnerability Scanning Best Practices for Accurate Detection! Security In the soaring number of cyberattacks that target a wide… rooter June 13, 2023 1 min read 0
AI-Generated Steganography Security New research suggests that AIs can produce perfectly secure steganographic… rooter June 12, 2023 2 min read 0
The University of Manchester suffered a cyber attack and suspects a data breach Security The University of Manchester suffered a cyberattack, attackers likely stole… rooter June 10, 2023 2 min read 0
Holistic API Security Strategy for 2023 Security In the digital landscape of 2023, Application Programming Interfaces (APIs)… rooter June 10, 2023 10 min read 0
Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe Security A crimeware group that usually targets individuals and SMBs in… rooter June 10, 2023 1 min read 0
Friday Squid Blogging: Light-Emitting Squid Security It’s a Taningia danae: Their arms are lined with two… rooter June 9, 2023 1 min read 0
Operation Triangulation: Zero-Click iPhone Malware Security Kaspersky is reporting a zero-click iOS exploit in the wild:… rooter June 9, 2023 2 min read 0
Weekly Update 351 Security Presently sponsored by: Kolide can get your cross-platform fleet to… rooter June 9, 2023 2 min read 0