Speakers: Archana Bharathan Executive Coach & Director of Outcomes Columbia Business School Teresa Foley Interim...
Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious “imageless” containers over...
The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial...
Operational Technology (OT)Â refers to the hardware and software used to change, monitor, or control the...
The U.K. National Cyber Security Centre (NCSC) is calling on manufacturers of smart devices to comply with...
Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android...
A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system (DNS) activities in...
How to disrupt email phishing attacks that target senior executives or budget holders....
It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those...
A security vulnerability has been discovered in the R programming language that could be exploited by a...
Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system that could...
Download the NCSC’s point-of-sale leaflet explaining how new PSTI regulation affects consumers and retailers....
Identity and access management (IAM) services provider Okta has warned of a spike in the...
Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old...
An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of...
Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited to compromise...
In today’s digital world, where connectivity is rules all, endpoints serve as the gateway to a...
Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. “Brokewell is a...
Palo Alto Networks has shared remediation guidance for a recently disclosed critical security flaw impacting PAN-OS that has...
Threat actors are attempting to actively exploit a critical security flaw in the WP‑Automatic plugin...
The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver...
On April 24, 2024, NIST was awarded the ‘Ecosystem Champion Award’ at the inaugural edition...
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how...
The U.S. Department of Justice (DoJ) on Wednesday announced the arrest of two co-founders of a cryptocurrency mixer...
For large, complex firms struggling with the prescriptiveness of Cyber Essentials, ‘Pathways’ will provide a...
Google has once again pushed its plans to deprecate third-party tracking cookies in its Chrome web browser...
A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom...
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four...
Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver malware called SSLoad....
Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users’ keystrokes to...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.