Open-Source LLMs Security In February, Meta released its large language model: LLaMA. Unlike… rooter June 2, 2023 6 min read 0
SSL Certificate Errors: Causes & Ways to Prevent and Fix Them Security Secure Socket Layer, or simply SSL, is the backbone of… rooter June 2, 2023 2 min read 0
All eyes on APIs: Top 3 API security risks and how to mitigate them Security As APIs are a favorite target for threat actors, the… rooter June 1, 2023 1 min read 0
Private APIs at Risk: Q1-2023 API ThreatStats™ Report Security According to a Mar-2022 API survey by Gartner, 98% of… rooter June 1, 2023 6 min read 0
On the Catastrophic Risk of AI Security Earlier this week, I signed on to a short group… rooter June 1, 2023 4 min read 0
5 free OSINT tools for social media Security A roundup of some of the handiest tools for the… rooter June 1, 2023 1 min read 0
Chinese Hacking of US Critical Infrastructure Security Everyone is writing about an interagency and international report on… rooter May 31, 2023 1 min read 0
Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme Security A peek under the hood of a cybercrime operation and… rooter May 31, 2023 1 min read 0
Brute-Forcing a Fingerprint Reader Security It’s neither hard nor expensive: Unlike password authentication, which requires… rooter May 30, 2023 2 min read 0
Antivirus Security and the Role of Artificial Intelligence (AI) Security With groundbreaking innovations and intelligent machines revolutionizing industries, the advent… rooter May 29, 2023 1 min read 0