The complexities of attack attribution – Week in security with Tony Anscombe Security As highlighted by new ESET research this week, attributing a… rooter October 5, 2024 1 min read 0
Friday Squid Blogging: Map of All Colossal Squid Sightings Security Interesting map, from this paper. Blog moderation policy. rooter October 4, 2024 1 min read 0
Latest product updates Security All announcements about Acunetix product updates and new releases are… rooter October 4, 2024 1 min read 0
8 Tips to protect your devices from malware attacks Security Unfortunately, when your devices are infected with a virus, it’s… rooter October 4, 2024 4 min read 0
New Perfctl Malware targets Linux servers in cryptomining campaign Security perfctl malware targets misconfigured Linux servers to deploy cryptocurrency miners… rooter October 4, 2024 4 min read 0
Zimbra Fixes Actively Exploited CVE-2024-45519 Flaw Allowing Unauthorised Code Execution Security Zimbra has issued an advisory regarding a critical vulnerability identified… rooter October 4, 2024 1 min read 0
Microsoft and DOJ seized the attack infrastructure used by Russia-linked Callisto Group Security Microsoft and the U.S. DoJ seized over 100 domains used… rooter October 4, 2024 6 min read 0
OpenText report raises awareness for consumer digital life protection as privacy concerns increase with generative AI use Security As generative AI usage becomes more widespread, two-thirds of respondents… rooter October 3, 2024 7 min read 0
Weird Zimbra Vulnerability Security Hackers can execute commands on a remote computer by sending… rooter October 3, 2024 2 min read 0
California AI Safety Bill Vetoed Security Governor Newsom has vetoed the state’s AI safety bill. I… rooter October 2, 2024 1 min read 0