The grand theft of Jake Moore’s voice: The concept of a virtual kidnap Posted on September 13, 2023 With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
Phemedrone info stealer campaign exploits Windows smartScreen bypass Security Threat actors exploit a recent Windows SmartScreen bypass flaw CVE-2023-36025… rooter January 15, 2024 3 min read 0
Apple created post-quantum cryptographic protocol PQ3 for iMessage Security Apple announced the implementation of a post-quantum cryptographic protocol called PQ3 will… rooter February 25, 2024 3 min read 0
UK Defence Secretary jet hit by an electronic warfare attack in Poland Security Russian hackers have knocked down the GPS and communications of… rooter March 15, 2024 3 min read 0
Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months Security Ukrainian authorities revealed that Russia-linked APT Sandworm had been inside telecom… rooter January 5, 2024 3 min read 0