North Korea’s Moonstone Sleet Widens Distribution of Malicious Code Posted on June 13, 2024 The recently identified threat actor uses public registries for distribution and has expanded capabilities to disrupt the software supply chain.
What Implementing Biometrics for Authentication Looks Like News CISOs are incorporating biometrics as part of their multifactor authentication… rooter August 1, 2023 1 min read 0
Cold War Spy Photos Reveal Ancient Subterranean Aqueducts News Qanats can date back 3,000 years, but can be really… rooter September 18, 2024 1 min read 0
Omnipresent License Plate Readers Enable Unconstitutional ‘Dragnet Surveillance Program,’ Lawsuit Says News The federal lawsuit filed in Virginia argues that Flock’s automated… rooter October 22, 2024 1 min read 0
Rare Handwritten Copy of Famous Shakespeare Sonnet Found in Oxford Library News The recently discovered copy of Sonnet 116 "reads as a… rooter March 3, 2025 1 min read 0