VMware ESXi flaw leveraged by BlackByte ransomware Jordyn Alger September 3, 2024 Recent investigations reveal that the BlackByte ransomware group is deploying techniques that vary from its typical methods.Read More
More than 650,000 education records exposed in the past 60 days Security Staff August 29, 2024 More than 650,000 records across various educational institutions have been exposed in the last 60 days. Read More
Cyberattacks on critical infrastructure increased by 30% in one year Security Staff August 27, 2024 A new report highlights the rising threat of cyber incidents against critical infrastructure. Read More
Report reveals 10% increase in the exploitation of old CVEs Security Staff August 9, 2024 The exploitation of old common vulnerabilities and exposures (CVEs) rose by 10% from 2023 to 2024. Read More
Researchers discovered a new phishing kit on the dark web Jordyn Alger July 22, 2024 Security leaders share their insights on a new phishing kit on the dark web. Read More
The new normal: How to embrace a cultural approach to zero trust Gary Barlet July 15, 2024 With the threat landscape ever evolving, combating increasingly sophisticated attacks necessitates a shift in focus from tools to culture.Read More
Unleashing the potential of investigative techniques Alan Saquella July 11, 2024 In the realm of executive protection, the necessity to expect and defuse potential threats is paramount. Read More
Global News 40% of organizations are unprepared for phishing attacks Taelor Sutherland July 10, 2024 Cyber risks, ransomware and cyberattacks were analyzed in a recent report.Read More
Special Report Ava Turner Leone | Women in Security 2024 Supply Chain Security Manager — IonQ Rachelle Blair-Frasier July 2, 2024 Ava Leone Turner keeps her curiosity alive in her role as Supply Chain Security Manager at quantum computing company IonQ.Read More
AI arms race: Cybersecurity defenders in the age of evolving threats Neal Bradbury June 27, 2024 By harnessing AI's capabilities, organizations will strengthen their resilience and enhance adaptability, forging a formidable defense against relentless cyber adversaries.Read More