Managing CISA Known Exploitable Vulnerabilities (KEVs) and enhancing cyber resilience using SanerNow Security Vulnerabilities and exploits are strange bedfellows. While vulnerabilities are unintended… rooter July 2, 2024 1 min read 0
Public Surveillance of Bars Security This article about an app that lets people remotely view… rooter July 2, 2024 1 min read 0
Upcoming Book on AI and Democracy Security If you’ve been reading my blog, you’ve noticed that I… rooter July 1, 2024 4 min read 0
CVE-2024-5655: GitLab Fixes CI/CD Vulnerability & 13 Other Flaws With Latest Patch Release Security A security flaw that impacts specific versions of GitLab’s Community… rooter July 1, 2024 3 min read 0
Model Extraction from Neural Networks Security A new paper, “Polynomial Time Cryptanalytic Extraction of Neural Network… rooter July 1, 2024 2 min read 0
What is Data Encryption: The Comprehensive Guide for Data Security Security What is Data Encryption? Data encryption changes data into ciphertext… rooter July 1, 2024 1 min read 0
16 Years of SecPod – Year 1, Phase IV Security A stunning silence had erupted in a national bank. My… rooter July 1, 2024 1 min read 0
The State of Data Breaches, Part 2: The Trilogy of Players Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter June 30, 2024 9 min read 0
Weekly Update 406 Security Presently sponsored by: Push Security. Stop identity attacks with a… rooter June 29, 2024 2 min read 0
Unlocking Digital Clues: Using Emojis in OSINT Investigations Security Delving into a more colourful digital space, emojis have become… rooter June 29, 2024 1 min read 0