
Cybersecurity report from Middle-earth
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
25 articles
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
A supply-chain attack against Copay cryptowallets through an open-source library enables bitcoin theft.
Case study: An analysis of insufficient safety practices at a small advertising agency.