Microsoft Warns of Large-Scale Use of Phishing Kits to Send Millions of Emails Daily News An open source adversary-in-the-middle (AiTM) phishing kit has found a… rooter March 14, 2023 1 min read 0
macOS Configuration Guidance from the mSCP: Draft NIST SP 800-219r1 Available for Comment News NIST requests comments on the initial public draft of Special… rooter March 14, 2023 1 min read 0
Can a quantum algorithm crack RSA cryptography? Not yet News Every CISO has encryption implementation decisions to make at a… rooter March 14, 2023 1 min read 0
Cybersecurity Tools Every MSPs Needs (Part 2) Cyber Security Cybersecurity tools every MSP needs (Part 2). Add these additional… rooter March 14, 2023 5 min read 0
$197 Million in Cryptocurrency Stolen in Euler Finance Attack Cyber Security On Sunday, a cryptocurrency flash loan attack on the lending… rooter March 14, 2023 1 min read 0
Personal data vs Sensitive Data: What’s the Difference? Cyber Security At the heart of the GDPR (General Data Protection Regulation)… rooter March 14, 2023 5 min read 0
Why Use an Authenticator App Instead of SMS? News Two-factor authentication (2FA) has become imperative in today’s digital world,… rooter March 14, 2023 1 min read 0
Dissecting the malicious arsenal of the Makop ransomware gang News Cyber security researcher Luca Mella analyzed the Makop ransomware employed… rooter March 14, 2023 7 min read 0
Educating girls on how to be their own cyber hero Security No matter how old you are, it is important to… rooter March 14, 2023 2 min read 0
Fortinet FortiOS Flaw Exploited in Targeted Cyberattacks on Government Entities News Government entities and large organizations have been targeted by an… rooter March 14, 2023 1 min read 0