As Tensions Mount With China, Taiwan Sees Surge in Attacks

Using phishing emails and zero-day exploits, China’s cyber-operations groups targeted Taiwanese organizations — including government agencies, telecommunications firms, and transportation ...
Read more
Teleport 17 Enhances Secure Infrastructure Access for Large Enterprises

Infrastructure identity provider Teleport has introduced its latest update, Teleport 17, designed to simplify the management of access controls and ...
Read more
Zero-Day Bug Fueling Fortinet Firewall Attacks

A zero-day flaw is likely to blame for a series of recent attacks on Fortinet FortiGate firewall devices that have ...
Read more
UK to follow America in imposing a ransomware payment ban

The United Kingdom is poised to implement a significant shift in its approach to tackling ransomware attacks, with a formal ...
Read more
CISA Releases the Cybersecurity Performance Goals Adoption Report

PRESS RELEASE Today, CISA released the Cybersecurity Performance Goals Adoption Report to highlight how adoption of Cybersecurity Performance Goals (CPGs) benefits our nation’s critical ...
Read more
Ransomware attack on Amazon and Dutch University

Amazon Storage Buckets Targeted by Codefinger Ransomware Amazon Web Services (AWS), often considered one of the most secure cloud storage ...
Read more
Championing Diversity in Cybersecurity Education
_Aleksei_Gorodenkov_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop&w=1200&resize=1200,630&ssl=1)
COMMENTARY As we enter 2025 and face an new presidential administration, the United States faces a critical challenge — maintaining ...
Read more
How Proactive Security Measures Can Cut Down Cyber Insurance Premiums

In today’s digital landscape, businesses of all sizes are increasingly relying on technology to streamline operations, enhance customer experiences, and ...
Read more
Russia Carves Out Commercial Surveillance Success

A half-dozen governments in Central Asia and Latin American have purchased the System for Operative Investigative Activities (SORM) wiretapping technology ...
Read more
Predictions for 2025’s biggest attacks from a pentester perspective

What’s Old is New: Network and Web Application Vulnerabilities The first newsworthy AI breach of 2024 didn’t come from a ...
Read more