CISA Releases the Cybersecurity Performance Goals Adoption Report

PRESS RELEASE Today, CISA released the Cybersecurity Performance Goals Adoption Report to highlight how adoption of Cybersecurity Performance Goals (CPGs) benefits our nation’s critical ...
Read more
Ransomware attack on Amazon and Dutch University

Amazon Storage Buckets Targeted by Codefinger Ransomware Amazon Web Services (AWS), often considered one of the most secure cloud storage ...
Read more
Championing Diversity in Cybersecurity Education
_Aleksei_Gorodenkov_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop&w=1200&resize=1200,630&ssl=1)
COMMENTARY As we enter 2025 and face an new presidential administration, the United States faces a critical challenge — maintaining ...
Read more
How Proactive Security Measures Can Cut Down Cyber Insurance Premiums

In today’s digital landscape, businesses of all sizes are increasingly relying on technology to streamline operations, enhance customer experiences, and ...
Read more
Russia Carves Out Commercial Surveillance Success

A half-dozen governments in Central Asia and Latin American have purchased the System for Operative Investigative Activities (SORM) wiretapping technology ...
Read more
Predictions for 2025’s biggest attacks from a pentester perspective

What’s Old is New: Network and Web Application Vulnerabilities The first newsworthy AI breach of 2024 didn’t come from a ...
Read more
Threat Actors Exploit a Critical Ivanti RCE Bug, Again

A Chinese threat actor is once again exploiting Ivanti remote access devices at large. If you had a nickel for ...
Read more
Understanding User Behavior Monitoring for Stronger Cybersecurity

The stark reality is that cyberattacks are no longer distant threats. In 2024, they pose a real and immediate risk ...
Read more
Fake CrowdStrike Job Interviews Become Latest Hacker Tactic

NEWS BRIEF Cybercriminals have picked up a new tactic, impersonating CrowdStrike recruiters in order to distribute a cryptominer on their ...
Read more
The Case of Email Spoofing: How to Identify And Avoid Email Attacks

Email has a lot going for it. It’s quick, easy, and incredibly widely used. However, just like every other remote ...
Read more