ESET Threat Report H2 2024 Security A view of the H2 2024 threat landscape as seen… rooter February 17, 2025 1 min read 0
Black Hat Europe 2024: Can AI systems be socially engineered? Security Could attackers use seemingly innocuous prompts to manipulate an AI… rooter February 17, 2025 1 min read 0
Black Hat Europe 2024: Why a CVSS score of 7.5 may be a ‘perfect’ 10 in your organization Security Aggregate vulnerability scores don’t tell the whole story – the… rooter February 17, 2025 1 min read 0
My information was stolen. Now what? Security The slow and painful recovery process rooter February 17, 2025 1 min read 0
Black Hat Europe 2024: Hacking a car – or rather, its infotainment system Security Our ‘computers on wheels’ are more connected than ever, but… rooter February 17, 2025 1 min read 0
Kathryn Thornton: Correcting Hubble’s vision | Starmus highlights Security The veteran of four space missions discusses challenges faced by… rooter February 17, 2025 1 min read 0
Cybersecurity is never out-of-office: Protecting your business anytime, anywhere Security While you’re enjoying the holiday season, cybercriminals could be gearing… rooter February 17, 2025 1 min read 0
RomCom exploits Firefox and Windows zero days in the wild Security ESET Research details the analysis of a previously unknown vulnerability… rooter February 17, 2025 1 min read 0
Bootkitty: Analyzing the first UEFI bootkit for Linux Security ESET researchers analyze the first UEFI bootkit designed for Linux… rooter February 17, 2025 1 min read 0
Scams to look out for this holiday season Security ‘Tis the season to be wary – be on your… rooter February 17, 2025 1 min read 0