CISA: Ivanti Vulns Chained Together in Cyberattack Onslaught Posted on January 23, 2025 The threat actors are abusing the vulnerabilities to gain initial access, obtain credentials, and install malicious scripts on user devices.
Catching the Catphish: Join the Expert Webinar on Combating Credential Phishing News Is your organization constantly under threat from credential phishing? Even… rooter August 21, 2023 1 min read 0
Amazon Bans Flipper Zero, Claiming It Violates Policy Against Card Skimming Devices News Amazon has banned the incredibly versatile Flipper Zero pen-testing tool… rooter April 8, 2023 1 min read 0
Under Pressure: US Charges China’s APT-for-Hire Hackers News The US Justice Department on Wednesday announced charges against members… rooter March 6, 2025 1 min read 0
Zero-Day Vulnerabilities Discovered in Global Emergency Services Communications Protocol News Weak encryption algorithms leave radio communications open to attack and… rooter July 25, 2023 1 min read 0