Poor Password Choices Security Look at this: McDonald’s chose the password “123456” for a… rooter August 25, 2025 1 min read 0
Weekly Update 466 Security Presently sponsored by: 1Password Extended Access Management: Secure every sign-in… rooter August 25, 2025 2 min read 0
Friday Squid Blogging: Bobtail Squid Security Nice short article on the bobtail squid. As usual, you… rooter August 22, 2025 1 min read 0
I’m Spending the Year at the Munk School Security This academic year, I am taking a sabbatical from the… rooter August 22, 2025 1 min read 0
Apple Fixes CVE-2025-43300 Zero-Day: Protect Your iOS, iPadOS & macOS Now Security A firmware-level security nightmare is unfolding across millions of Apple… rooter August 22, 2025 1 min read 0
Data poisoning risks and defenses for AI teams Security Attackers no longer need direct access to production systems when… rooter August 22, 2025 1 min read 0
AI Agents Need Data Integrity Security Think of the Web as a digital territory with its… rooter August 22, 2025 13 min read 0
Exploiting API4 — 8 Real-World Unrestricted Resource Consumption Attack Scenarios (and How to Stop Them) Security Unrestricted Resource Consumption (API4:2023) is the only threat category in… rooter August 22, 2025 6 min read 0
What Is Containers-as-a-Service (CaaS)? Security Modern software teams are increasingly adopting container technology to deploy… rooter August 22, 2025 1 min read 0
Cloud Workload Protection: Safeguarding the Backbone of Modern Enterprises Security The cloud has become the backbone of modern enterprises. From… rooter August 22, 2025 1 min read 0