CISA Releases the Cybersecurity Performance Goals Adoption Report

CISA Releases the Cybersecurity Performance Goals Adoption Report
PRESS RELEASE Today, CISA released the Cybersecurity Performance Goals Adoption Report to highlight how adoption of Cybersecurity Performance Goals (CPGs) benefits our nation’s critical ...
Read more

Ransomware attack on Amazon and Dutch University

Ransomware attack on Amazon and Dutch University
Amazon Storage Buckets Targeted by Codefinger Ransomware Amazon Web Services (AWS), often considered one of the most secure cloud storage ...
Read more

Championing Diversity in Cybersecurity Education

Championing Diversity in Cybersecurity Education
COMMENTARY As we enter 2025 and face an new presidential administration, the United States faces a critical challenge — maintaining ...
Read more

How Proactive Security Measures Can Cut Down Cyber Insurance Premiums

How Proactive Security Measures Can Cut Down Cyber Insurance Premiums
In today’s digital landscape, businesses of all sizes are increasingly relying on technology to streamline operations, enhance customer experiences, and ...
Read more

Russia Carves Out Commercial Surveillance Success

Russia Carves Out Commercial Surveillance Success
A half-dozen governments in Central Asia and Latin American have purchased the System for Operative Investigative Activities (SORM) wiretapping technology ...
Read more

Predictions for 2025’s biggest attacks from a pentester perspective

Predictions for 2025’s biggest attacks from a pentester perspective
What’s Old is New: Network and Web Application Vulnerabilities The first newsworthy AI breach of 2024 didn’t come from a ...
Read more

Threat Actors Exploit a Critical Ivanti RCE Bug, Again

Threat Actors Exploit a Critical Ivanti RCE Bug, Again
A Chinese threat actor is once again exploiting Ivanti remote access devices at large. If you had a nickel for ...
Read more

Understanding User Behavior Monitoring for Stronger Cybersecurity

Understanding User Behavior Monitoring for Stronger Cybersecurity
The stark reality is that cyberattacks are no longer distant threats. In 2024, they pose a real and immediate risk ...
Read more

Fake CrowdStrike Job Interviews Become Latest Hacker Tactic

Fake CrowdStrike Job Interviews Become Latest Hacker Tactic
NEWS BRIEF Cybercriminals have picked up a new tactic, impersonating CrowdStrike recruiters in order to distribute a cryptominer on their ...
Read more

The Case of Email Spoofing: How to Identify And Avoid Email Attacks

The Case of Email Spoofing: How to Identify And Avoid Email Attacks
Email has a lot going for it. It’s quick, easy, and incredibly widely used. However, just like every other remote ...
Read more