Former Uber CISO Appealing His Conviction Security Joe Sullivan, Uber’s CEO during their 2016 data breach, is… rooter October 19, 2023 3 min read 0
North Korea-linked APT groups actively exploit JetBrains TeamCity flaw Security North Korea-linked threat actors are actively exploiting a critical vulnerability… rooter October 19, 2023 3 min read 0
Better safe than sorry: 10 tips to build an effective business backup strategy Security How robust backup practices can help drive resilience and improve… rooter October 19, 2023 1 min read 0
Multiple APT groups exploited WinRAR flaw CVE-2023-38831 Security Google TAG reported that both Russia and China-linked threat actors… rooter October 19, 2023 3 min read 0
Cyber Security Awareness Month insights and analysis Cyber Security Congressman Bennie G. Thompson (MS-2) is an elected member of… rooter October 18, 2023 10 min read 0
Californian IT company DNA Micro leaks private mobile phone data Security Hundreds of thousands of clients who opted-in for a screen… rooter October 18, 2023 4 min read 0
23andMe Cyberbreach Exposes DNA Data, Potential Family Ties News The information leaked in the breach involves personally identifiable information… rooter October 18, 2023 1 min read 0
Suspected Crime Gang Hacks Israeli President’s Telegram Account News The encrypted messaging app was hacked in the wake of… rooter October 18, 2023 1 min read 0
Google, Yahoo Push DMARC, Forcing Companies to Catch Up News The move means that DMARC, already in use by half… rooter October 18, 2023 1 min read 0
Preparing for the Unexpected: A Proactive Approach to Operational Resilience News Try these steps to create an operational resilience action plan… rooter October 18, 2023 1 min read 0