Surveillance Watch Security This is a fantastic project mapping the global surveillance industry. rooter August 23, 2024 1 min read 0
How regulatory standards and cyber insurance inform each other Security Should the payment of a ransomware demand be illegal? Should… rooter August 22, 2024 1 min read 0
Building a Solid Patch Management Plan to Ward-Off Cyberattacks Security Handling security in today’s cybersecurity landscape is definitely not easy!… rooter August 22, 2024 1 min read 0
Story of an Undercover CIA Agent who Penetrated Al Qaeda Security Rolling Stone has a long investigative story (non-paywalled version here)… rooter August 21, 2024 1 min read 0
Vulnerability Management Workflow Security Vulnerability Management, the name itself says it all. We all… rooter August 21, 2024 1 min read 0
Hacking Wireless Bicycle Shifters Security This is yet another insecure Internet-of-things story, this one about… rooter August 20, 2024 1 min read 0
Fraud Investment Scams That Appear Legitimate Security With the advent of the internet there have been an… rooter August 20, 2024 1 min read 0
Announcing new EDR capabilities for Webroot Endpoint Protection Security Introducing key EDR functionality In today’s rapidly evolving cyber landscape,… rooter August 19, 2024 3 min read 0
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF Security The Other Crowdstrike Outage On July 19, 2024, a flawed… rooter August 19, 2024 7 min read 0
The State of Ransomware Security Palo Alto Networks published its semi-annual report on ransomware. From… rooter August 19, 2024 1 min read 0