SSL Certificate Expiration: Unveiling the Causes and How to Avoid It Security Secure Socket Layer (SSL) certificates are digital certificates for authenticating… rooter June 8, 2023 2 min read 0
Asylum Ambuscade: crimeware or cyberespionage? Security A curious case of a threat actor at the border… rooter June 8, 2023 1 min read 0
Paragon Solutions Spyware: Graphite Security Paragon Solutions is yet another Israeli spyware company. Their product… rooter June 8, 2023 1 min read 0
From Scan to Secure: Using Your Vulnerability Scan Report to Strengthen Your Cyberdefense Security Do you think your organization is not vulnerable to cyberattacks… rooter June 8, 2023 1 min read 0
How to Reduce Third-Party Risk Security The chance that a third-party vendor or supplier will expose… rooter June 8, 2023 1 min read 0
Hear no evil: Ultrasound attacks on voice assistants Security How your voice assistant could do the bidding of a… rooter June 7, 2023 1 min read 0
OWASP API Security Top-10 for 2023 Risk Ratings Security As you know by now, the final version of the… rooter June 7, 2023 4 min read 0
Google Chrome Rolls out an Emergency Security Patch for a High Severity Zero-day vulnerability Security Google has recently released an emergency security fix to patch… rooter June 7, 2023 1 min read 0
How Attorneys Are Harming Cybersecurity Incident Response Security New paper: “Lessons Lost: Incident Response in the Age of… rooter June 7, 2023 2 min read 0
7 tips for spotting a fake mobile app Security Plus, 7 ways to tell that you downloaded a sketchy… rooter June 7, 2023 1 min read 0