Analysis of two arbitrary code execution vulnerabilities affecting WPS Office Security Demystifying CVE-2024-7262 and CVE-2024-7263 rooter August 29, 2024 1 min read 0
Stealing cash using NFC relay – Week in Security with Tony Anscombe Security The discovery of the NGate malware by ESET Research is… rooter August 29, 2024 1 min read 0
Adm. Grace Hopper’s 1982 NSA Lecture Has Been Published Security The “long lost lecture” by Adm. Grace Hopper has been… rooter August 29, 2024 1 min read 0
Risk vs. Vulnerability Assessment: Should we Compare Them? Security With so much information/ data stored digitally or on the… rooter August 29, 2024 1 min read 0
What is Vulnerability Debt? Security We have a love-hate relationship with debt. But why am… rooter August 29, 2024 1 min read 0
Understanding Sleep Obfuscation Security How Malware Uses Sleep Cycles to Avoid Detection The post… rooter August 28, 2024 1 min read 0
Matthew Green on Telegram’s Encryption Security Matthew Green wrote a really good blog post on what… rooter August 28, 2024 1 min read 0
Cyberattack Disrupts Operations at Seattle-Tacoma Airport Security In an alarming escalation of cyber threats targeting critical infrastructure,… rooter August 27, 2024 1 min read 0
The Present and Future of TV Surveillance Security Ars Technica has a good article on what’s happening in… rooter August 27, 2024 1 min read 0
Proactive vs Reactive Cybersecurity Security Organizations are constantly under threat from cyberattacks. Hackers are more… rooter August 27, 2024 1 min read 0