RMM: Tool Convenience and Control Comes with a Cost Security Imagine this scenario: You’re winding down for the evening, having… rooter May 27, 2025 1 min read 0
Chinese-Owned VPNs Security One one my biggest worries about VPNs is the amount… rooter May 27, 2025 1 min read 0
Weekly Update 453 Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter May 27, 2025 1 min read 0
Friday Squid Blogging: US Naval Ship Attacked by Squid in 1978 Security Interesting story: USS Stein was underway when her anti-submarine sonar… rooter May 23, 2025 1 min read 0
Danabot under the microscope Security ESET Research has been tracking Danabot’s activity since 2018 as… rooter May 23, 2025 1 min read 0
Signal Blocks Windows Recall Security This article gives a good rundown of the security risks… rooter May 23, 2025 1 min read 0
Danabot: Analyzing a fallen empire Security ESET Research shares its findings on the workings of Danabot,… rooter May 22, 2025 1 min read 0
Lumma Stealer: Down for the count Security The bustling cybercrime enterprise has been dealt a significant blow… rooter May 22, 2025 1 min read 0
Attackers Abuse TikTok and Instagram APIs Security It must be the season for API security incidents. Hot… rooter May 22, 2025 6 min read 0
Man-in-the-Middle Cyber Attacks Security MITM (man-in-the-middle) cyber attacks is a generic term for a… rooter May 22, 2025 1 min read 0