Friday Squid Blogging: Peru Trying to Protect its Squid Fisheries Security Peru is trying to protect its territorial waters from Chinese… rooter July 19, 2024 1 min read 0
Brett Solomon on Digital Rights Security Brett Solomon is retiring from AccessNow after fifteen years as… rooter July 19, 2024 1 min read 0
AI in Cybersecurity: Improving Threat Detection And Response Times Security Artificial Intelligence (AI) is all the buzz lately! It has… rooter July 19, 2024 1 min read 0
NIST Vulnerability Management Security Cybersecurity is important. It’s a hard truth we all must… rooter July 19, 2024 1 min read 0
Two of Wallarm’s Open-source Tools Have Been Accepted into Black Hat Arsenal 2024 Security We’re gearing up with some seriously cool stuff for Black… rooter July 19, 2024 3 min read 0
GeoServer Critical RCE Flaw Actively Exploited, Warns CISA Security GeoServer, an open-source tool used to share and modify geospatial… rooter July 19, 2024 1 min read 0
Criminal Gang Physically Assaulting People for Their Cryptocurrency Security This is pretty horrific: …a group of men behind a… rooter July 18, 2024 1 min read 0
What is Cookies Hacking (Hijacking)? How To Prevent it? Security Imagine someone sneaking into your kitchen not for the cookies… rooter July 18, 2024 1 min read 0
Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious Security 6.8%, to be precise. From ZDNet: However, Distributed Denial of… rooter July 17, 2024 1 min read 0
Securing Every Angle – A Threat Model for an IoT Enabled Smart Parking System Security Welcome to the second part of this two-part blog on… rooter July 17, 2024 1 min read 0