How Hackers Can Hijack a Satellite Posted on July 14, 2023 We rely on them for communications, military activity, and everyday tasks. How long before attackers really start to look up at the stars?
Cohesity Data Cloud 7.0 enhances privileged access authentication, ransomware recovery News Data security and management vendor has announced the 7.0 software… rooter February 16, 2023 1 min read 0
Codefinger ransomware gang uses compromised AWS keys to encrypt S3 bucket News The ransomware group Codefinger is using compromised AWS keys to… rooter January 15, 2025 4 min read 0
Meta AI Models Cracked Open With Exposed API Tokens News Researchers at Lasso Security found 1,500+ tokens in total that… rooter December 8, 2023 1 min read 0
DOGE Threat: How Government Data Would Give an AI Company Extraordinary Power News U.S. executives have complained that China's centralized system gives its… rooter March 9, 2025 1 min read 0