Weekly Update 349 Security Presently sponsored by: Kolide can get your cross-platform fleet to… rooter May 27, 2023 2 min read 0
How an innocuous app morphed into a trojan – Week in security with Tony Anscombe Security ESET research uncovers an Android app that initially had no… rooter May 27, 2023 1 min read 0
Friday Squid Blogging: Online Cephalopod Course Security Atlas Obscura has a five-part online course on cephalopods, taught… rooter May 26, 2023 1 min read 0
Expeditionary Cyberspace Operations Security Cyberspace operations now officially has a physical dimension, meaning that… rooter May 26, 2023 2 min read 0
Find APIs Hiding in the Shadows Security What’s hiding in the shadows? It’s a well understood reality… rooter May 25, 2023 3 min read 0
Shedding light on AceCryptor and its operation Security ESET researchers reveal details about a prevalent cryptor, operating as… rooter May 25, 2023 1 min read 0
Unveiling Hidden Intel: Why Leveraging Phishing Emails for Intelligence is Essential Security Introduction The evolution of threats is constant in today’s digital… rooter May 25, 2023 1 min read 0
On the Poisoning of LLMs Security Interesting essay on the poisoning of LLMs—ChatGPT in particular: Given… rooter May 25, 2023 1 min read 0
Digital security for the self‑employed: Staying safe without an IT team to help Security Nobody wants to spend their time dealing with the fallout… rooter May 24, 2023 1 min read 0
Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws Security It’s been a big month for US data privacy. Indiana,… rooter May 24, 2023 1 min read 0