Resources

Manufacturing at Bassett Furniture Affected by Data Breach

Major Cyberattack Disrupts Bassett Furniture Industries Operations: Details and Response Bassett Furniture Industries, a well-known furniture company based in Virginia, is currently grappling with the...

SPTel, ST Engineering, Nokia, and Fortinet Collaborate to Introduce Quantum Safe Services for Intelligent CISOs

SPTel, ST Engineering, Nokia, and Fortinet Launch Quantum Safe Services for Comprehensive Network Protection SPTel, a joint venture company of ST Engineering and SP Group,...

Exposed Legitimate Credentials Drive Snowflake Account Attacks

Analysis of a Major Data Breach: Lessons Learned and How to Protect Your Organization In a shocking turn of events, threat actors have successfully executed...

Virginia Department of Elections Refutes Allegations of Data Breach

Virginia Department of Elections Dismisses Data Breach Allegations & Confirms Data Scraped from Official Website The Virginia Department of Elections recently faced allegations of a...

Singaporean and Malaysian companies resort to paying ransoms due to shortcomings in cyber resilience and data recovery efforts – Intelligent CISO

Cohesity Research Reveals Challenges in Data Recovery and Business Processes After Cyberattacks The research commissioned by Cohesity has revealed a concerning trend among companies in...

Lineaje receives contract from US Air Force Department

Lineaje Selected by U.S. Air Force for SBOM360 Contract Lineaje, a leading provider of continuous software supply chain security management solutions, has made a significant...

ChatGPT and Google Gemini Successfully Pass Cybersecurity Exams

Exploring the Impact of Large Language Models on Ethical Hacking Practices: A Study by the University of Missouri and Amrita University The collaborative efforts of...

British local authorities record more than 5,000 data breaches – Intelligent CISO

Apricorn's Annual Findings on Data Breaches Amongst Local Councils Apricorn, a leading manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB drives, has raised alarm bells...

5 Strategies for Reducing the Threat of Data Exfiltration

Mitigating the Risk of Data Breaches: Strategies for Protecting Your Organization's Information Data breaches and cyberattacks continue to be a prevalent threat in the digital...

Act 33 of Pennsylvania’s New Law Provides Aid to Victims of Data Breaches

Pennsylvania's Act 33: Strengthening Consumer Protections After Data Breaches - Key Provisions and Impact The state of Pennsylvania has taken a bold step towards protecting...

Strategies for Prominent Figures to Safeguard Against Catphishing Threats – Intelligent CISO

Protecting Prominent Individuals from Cyber Threats: Insights from Mimecast, EY, SailPoint, and Beachhead Solutions Mimecast has issued a critical plea to the UK Parliament to...

Euro Vishing Scammers Employing Physical Intimidation as Part of Their Tactics

"Europol Arrests 54 in Connection with Vishing Scam Targeting Elderly Spanish Citizens" Europol's recent announcement of the arrest of 54 individuals involved in a voice...

Recent articles