As foretold in
https://forums.servethehome.com/ind...cts-all-amd-zen-cpus-yikes.41067/#post-388344 that this would happen (again).
Another item to consider is that STH may be a worthwile target for a watering hole style attack. Because the student serving a petabyte out of this dorm room and the defense contractor employee with access to sensitive information share one thing, they visit STH. Today it was a hijacked ad service redirecting into Ukraine, tomorrow it will be a Chromium zero-click zero-day sandbox exploit that someone bought for 100k. If you look, there is a serious RCE CVE every couple of weeks for Chromium. This is the next MOVEit and SolarWinds in the making.
If you can, don't use Windows, or the "evil triplet" Windows plus Office plus Active Directory, keep browser current, keep OS current to hinder privilege escalation, use uMatrix to limit javascript execution, block ads (yes, I know about the ramifications for site operator), audit your network traffic every week, do not use or auto-update any browser extensions. And when you're done with that, plug any holes in your email system. If I can send you a zipped ISO file or Office document with macros as an attachment, something is wrong.