ESET Research Podcast: Sextortion, digital usury and SQL brute-force Posted on September 13, 2023 Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
Meta disrupted two influence campaigns from China and Russia Security Meta disrupted two influence campaigns orchestrated by China and Russia,… rooter September 5, 2023 3 min read 0
CISA adds Check Point Quantum Security Gateways and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog Security CISA adds Check Point Quantum Security Gateways and Linux Kernel… rooter May 30, 2024 2 min read 0
CVE-2023-34990: Critical Path Traversal Flaw Found in Fortinet FortiWLM Security On 12 May 2023, Horizon3 researcher Zach Hanley found an… rooter December 20, 2024 1 min read 0
Fundamentals of GraphQL-specific attacks Security GraphQL vs REST APIs Developers are constantly exploring new technologies… rooter September 13, 2024 7 min read 0