Zombie APIs: The Scariest Threat Lurking in The Shadows? Cyber Security By Dan Hopkins, VP of Engineering at StackHawk IT modernization… rooter January 12, 2024 1 min read 0
7 Steps to Build a Defense in Depth Strategy for Your Home Cyber Security By Roger Spears – Cybersecurity Project Manager, Schneider Downs One… rooter January 12, 2024 1 min read 0
Sophos named a Leader in 2023 Gartner®️ Magic Quadrant™️ for Endpoint Protection Platforms News For the 14th consecutive report, Sophos has been recognized as… rooter January 12, 2024 1 min read 0
UAC-0050 Attack Detection: Hackers Are Armed with Remcos RAT, Quasar RAT, and Remote Utilities to Target Ukraine Once Again Threats At the end of 2023, the nefarious UAC-0050 group loomed… rooter January 12, 2024 5 min read 0
Why Prioritising Digital Security Matters Security “Securing Your Digital Fort: Why Prioritising Digital Security Matters More… rooter January 12, 2024 1 min read 0
Researchers created a PoC for Apache OFBiz flaw CVE-2023-51467 Security Researchers published a proof-of-concept (PoC) code for the recently disclosed critical flaw CVE-2023-51467… rooter January 12, 2024 3 min read 0
Vast Voter Data Leaks Cast Shadow Over Indonesia ’s 2024 Presidential Election Security Investigators from Resecurity’s HUNTER (HUMINT) warn that Indonesia is increasingly… rooter January 12, 2024 4 min read 0
On IoT Devices and Software Liability Security New law journal article: Smart Device Manufacturer Liability and Redress… rooter January 12, 2024 1 min read 0
Why Prioritizing Digital Security Matters Security “Securing Your Digital Fort: Why Prioritizing Digital Security Matters More… rooter January 12, 2024 1 min read 0
Team Liquid’s wiki leak exposes 118K users Security Liquipedia, an online e-sports platform run by Team Liquid, exposed… rooter January 12, 2024 3 min read 0