Browsing Category
Cybersecurity
What is Business Email Compromise?
A Guide to CEO Fraud
By Shanna Utgard, Senior Cyber Advocate, Defendify
“URGENT – Are you available? I need you to take care…
North Korean Hackers Target US Health Providers With ‘Maui’…
The Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory suggesting North Korean state-sponsored…
APT Hacker Group Bitter Continues to Attack Military Targets in Bangladesh
An advanced persistent threat (APT) operating under the name of ‘Bitter’ continues to conduct cyber-attacks against military…
Hive Ransomware Upgraded to Rust to Deliver More Sophisticated Encryption
Researchers from Microsoft Security have spotted an upgraded version of the ransomware-as-a-service (RaaS) dubbed Hive.
The…
Google Patches Chrome Zero Day Under Attack
Google has released an update to its popular Chrome browser to fix four vulnerabilities, including one zero-day current being…
NCSC: Prepare for Protected Period of Heightened Cyber-Risk
The UK’s leading cybersecurity agency has urged organizations to follow best practices and take care of their infosecurity staff…
Software Supply Chain Attack Hits Thousands of Apps
Security researchers have discovered a significant new software supply chain attack affecting thousands of applications and…
Why A “Group of Rivals” Developed A Cybersecurity Taxonomy, And What It…
Advancing Risk Management and Stemming the River of Risk by Adopting the Consistent Taxonomy of Cybersecurity Threats –…
The Most Common Types of Cyberattacks Plaguing SMBs An How to Protect…
By Richard Clarke, Chief Insurance Officer, Colonial Surety
The media landscape is dominated by headlines like this “Hackers…
NIST Acknowledges First Four Quantum-Resistant Encryption Tools
The US Department of Commerce’s National Institute of Standards and Technology (NIST) has selected the first-ever group of…