‘Elusive Comet’ Attackers Use Zoom to Swindle Victims Posted on April 21, 2025 The threat actor uses sophisticated social engineering techniques to infect a victim’s device, either with an infostealer or remote access Trojan (RAT).
Mideast, Turkey Cyber Threats Spike, Prompting Defense Changes News The vast majority of organizations in the region saw more… rooter October 8, 2024 1 min read 0
NASA’s ISS Spacesuit Situation Turns Grim News Two NASA astronauts were preparing to exit the International Space… rooter June 26, 2024 1 min read 0
Former Samsung Exec Allegedly Stole Plans for an Entire Chip Plant News South Korean prosecutors have arrested a former Samsung Electronics executive.… rooter June 12, 2023 1 min read 0
Aaron Taylor-Johnson and Others Join Robert Eggers’ Nosferatu Remake News Since late last year, Robert Eggers has been gradually adding… rooter March 4, 2023 1 min read 0