ESET Research Podcast: Sextortion, digital usury and SQL brute-force Posted on September 13, 2023 Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
The Story of Cyberattack: MOVEitTransfer Security In countless organizations worldwide, from bustling universities to national healthcare… rooter July 11, 2025 1 min read 0
CISA guidelines to protect critical infrastructure against AI-based threats Security The US government’s cybersecurity agency CISA published a series of… rooter April 30, 2024 2 min read 0
Friday Squid Blogging: New Squid Species Security An ancient squid: New research on fossils has revealed that… rooter September 22, 2023 1 min read 0
Join my Twitter Subscription for the Inside Word on Data Breaches Security Presently sponsored by: Kolide ensures only secure devices can access… rooter April 19, 2023 4 min read 0